Business networks in Pennsylvania can depend on quick and economical online help from Progent's accredited network security consultants to resolve urgent security issues. Rates are reasonable, charges are by the minute, sign-up is immediate, and support is unbeatable. Progent also provides help for long-term projects that requires the expertise of seasoned security consultants with top security certifications.
If your Pennsylvania company is based some distance from more populated urban neighborhoods including Philadelphia, Pittsburgh, Allentown, or Erie, access to local accredited security consultants may be problematic when you have a security disaster. This can result in a drop in revenue for your business, upset clients, idle employees, and distracted management. By calling Progent's remote support, you have access to a qualified security consultant who can deliver expertise when you need it to keep your information system on line and recover your information.
Progent can assist you in all your efforts to defend your IT environment with services that ranges from network security audits to creating a comprehensive security strategy. Progent provides economical service to help businesses of all sizes to set up and maintain protected IT environments powered by Windows and Cisco products and that can include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X platforms plus BYOD users with Apple iOS iPhones and iPads or Google Android or Windows Phone smart phones and tablets.
Progent can also show you how to outsource spam filtering and protection from email-borne security threats. Email Guard is Progent's email security solution that uses the services and infrastructure of top data security vendors to deliver centralized management and world-class protection for your inbound and outbound email. The powerful architecture of Email Guard managed service integrates cloud-based filtering with a local security gateway device to provide complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The Cloud Protection Layer serves as a preliminary barricade and keeps most unwanted email from making it to your security perimeter. This reduces your exposure to inbound threats and saves network bandwidth and storage space. ProSight Email Guard's on-premises gateway device adds a deeper layer of analysis for inbound email. For outgoing email, the on-premises security gateway offers anti-virus and anti-spam filtering, protection against data leaks, and encryption. The local gateway can also help Microsoft Exchange Server to track and protect internal email traffic that originates and ends inside your corporate firewall.
Progent's security consultants are available online or on premises to provide a range of urgent or longer-term network security services including:
If your business has an emergency requirement for IT security help, refer to Progent's Emergency Remote Network Support.
Progent's engineers can deliver world-class support in key areas of system protection that include security evaluation, firewall and VPN expertise, and advanced security planning.
System Security Audits
Progent's certified security consultants can evaluate the effectiveness of your current computer protection systems by performing exhaustive remote automated analysis based on advanced utilities and tested techniques. Progent's skill in this service saves your company money and assures an accurate picture of system vulnerability. The information your business is provided can be used as the basis of a network protection strategy that will allow your network to run dependably and react rapidly to new risks.
Automated Security Analysis
Progent provides expertise in the application of security analysis software such as Microsoft's MBSA and GFI LANguard NSS for affordably running a set of programmed system auditing checks to uncover possible security problems. Progent has extensive knowledge of additional security auditing utilities such as NMAP Port Scanner, AMAP, eEye Vulnerability Scanner, as well as tools such as Metasploit Framework, Netcat, Hydra, and Nikto. Progent can help you to make sense of audit reports and respond effectively.
Progent can show you how to build protection into your company processes, configure auditing software, define and deploy a secure network environment, and suggest policies to maximize the safety of your IT system. Progent's security engineers are able to help you configure a firewall, implement safe remote connectivity to email and data, and integrate VPN. Learn additional information concerning Progent's automated security assessment.
Security Inventory and Evaluation Bundles for Small Companies
Progent has put together two ultra-affordable security inventory service packages intended to allow small businesses to receive an independent network security assessment from a certified security engineer. With Progent's External Network Security Inventory Checkup, a security expert runs an extensive examination of your network from beyond your firewall to determine potential risks in the security profile you present to the outside world. With Progent's Internal Security Inventory Checkup, a security engineer runs a system scan from an authorized machine inside your company firewall to uncover vulnerabilities to inside attacks. The two security inventory packages are set up and executed from a protected remote site. The project is overseen by a consultant with top security accreditations and who generates a document that details and analyzes the information captured by the security scan and proposes practical remediation where appropriate.
Network Intrusion Analysis Consulting
Stealth intrusion checking is an important component of any successful network security strategy. Progentís security professionals can perform thorough penetration tests without the knowledge of your company's in-house IT staff. Stealth penetration testing shows whether existing security monitoring tools such as intrusion detection alerts and event log analysis are properly configured and actively monitored. Learn additional information about Progent's network penetration testing consulting.
Firewall and Virtual Private Network Solutions
Progent's background in network security technology encompasses in-depth familiarity with leading firewalls and Virtual Private Network (VPN) technology offered by multiple vendors including Cisco, Microsoft, and Symantec. Progent offers the support of consultants with important industry certifications such as CCIE and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Integration and Troubleshooting
The latest generation of ASA 5500-X Family Next-Generation Firewalls with Firepower Services deliver significantly more bang for the buck than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX firewalls for new deployments. After Cisco's acquisition of Sourcefire, the whole line of ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system. Firepower services provide enhanced capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-qualified CCIE network consultants can help your company to maintain your legacy PIX or ASA 5500 security appliances or migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite help with ASA 5500-X firewalls with Firepower Services and can help your organization to plan, deploy, tune, manage and debug firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about Cisco ASA 5500-X Firewalls with Firepower Services configuration and debugging support.
Cisco Network Security and VPN Consulting Services
Cisco's network security and offsite connection products represent a comprehensive range of manageable security solutions to help protect your local and remote network infrastructure. Cisco's VPN line features routers, firewalls, intrusion detection devices and VPN concentrators. Progent's professional consulting staff includes experienced engineers with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional qualifications who can assist your company to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that fit best with your company objectives. Find out more details about Progent's Engineering Expertise for Cisco Security Technology and VPN Products.
Engineering Services for Additional Firewall and VPN Solutions
Progent provides small and medium size organizations expert consulting for Intrusion Protection Systems and IPsec VPN technology from leading firewall and VPN security companies such as WatchGuard, Juniper, and SonicWALL. Progent can help you create a detailed security plan and select the right technologies from multiple suppliers to support your security goals while sticking within your spending restraints.
Progent's Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight line of managed services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services offered by Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection solution that incorporates next generation behavior-based analysis tools to defend endpoints as well as servers and VMs against new malware assaults such as ransomware and email phishing, which routinely get by legacy signature-matching anti-virus products. ProSight ASM protects on-premises and cloud-based resources and provides a single platform to manage the complete threat progression including protection, detection, containment, cleanup, and forensics. Top features include single-click rollback using Windows VSS and automatic network-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection managed services deliver affordable multi-layer security for physical and virtual servers, desktops, smartphones, and Exchange email. ProSight ESP uses contextual security and advanced machine learning for continuously monitoring and reacting to security threats from all attack vectors. ProSight ESP offers firewall protection, penetration alerts, device control, and web filtering via leading-edge tools packaged within one agent accessible from a unified console. Progent's data protection and virtualization consultants can help you to design and implement a ProSight ESP deployment that addresses your company's unique requirements and that helps you demonstrate compliance with government and industry information protection standards. Progent will assist you define and configure policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alerts that require immediate attention. Progent can also assist you to install and test a backup and restore solution like ProSight Data Protection Services so you can recover quickly from a potentially disastrous cyber attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Exchange email filtering.
ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services provide small and medium-sized organizations a low cost end-to-end service for secure backup/disaster recovery. For a fixed monthly cost, ProSight DPS automates and monitors your backup activities and enables fast restoration of critical data, apps and VMs that have become unavailable or damaged as a result of component failures, software glitches, natural disasters, human error, or malware attacks like ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, apps, system images/, as well as Microsoft Hyper-V and VMware virtual machine images/. Important data can be protected on the cloud, to a local device, or to both. Progent's BDR specialists can deliver advanced support to configure ProSight DPS to be compliant with government and industry regulatory requirements like HIPPA, FIRPA, and PCI and, when needed, can help you to restore your business-critical data. Learn more about ProSight Data Protection Services Managed Cloud Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that uses the infrastructure of top information security companies to deliver web-based control and comprehensive security for all your email traffic. The hybrid structure of Email Guard combines cloud-based filtering with an on-premises gateway device to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The cloud filter serves as a first line of defense and blocks most unwanted email from making it to your security perimeter. This decreases your exposure to inbound attacks and conserves system bandwidth and storage space. Email Guard's onsite security gateway device provides a deeper level of inspection for inbound email. For outbound email, the local security gateway offers AV and anti-spam filtering, protection against data leaks, and email encryption. The on-premises gateway can also assist Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends inside your corporate firewall. For more details, see ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its critical servers and applications hosted in a secure Tier III data center on a fast virtual host set up and managed by Progent's network support experts. Under the ProSight Virtual Hosting model, the customer retains ownership of the data, the OS software, and the applications. Since the environment is virtualized, it can be ported immediately to a different hardware solution without requiring a time-consuming and difficult reinstallation process. With ProSight Virtual Hosting, you are not locked into one hosting service. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, update, find and protect data about your network infrastructure, processes, applications, and services. You can quickly find passwords or IP addresses and be alerted automatically about upcoming expirations of SSL certificates or domains. By updating and managing your network documentation, you can eliminate as much as 50% of time spent looking for critical information about your IT network. ProSight IT Asset Management features a common location for storing and collaborating on all documents related to managing your network infrastructure like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers advanced automation for gathering and associating IT information. Whether youíre making improvements, performing regular maintenance, or responding to a crisis, ProSight IT Asset Management delivers the information you need when you need it. Learn more details about Progent's ProSight IT Asset Management service.
Certified Security Planning
Any company ought to develop a thoroughly thought out security strategy that includes both proactive processes and response plans. The proactive strategy is a set of mechanisms intended to minimize vulnerabilities. The post-attack strategy helps your company's IT security engineers to assess the damage caused by an attack, fix the system, record the event, and get business functions running as rapidly as possible.
Progent's certified IS security engineers can to assist your company to run a complete risk evaluation and create a computer security plan to establish security processes and mechanisms to reduce future assaults and dangers.
CISM Accredited System Security Engineering Expertise
The CISM committee defines the basic competencies and worldwide standards of performance that information security managers are expected to learn. It provides business management the confidence that those who have qualified for their CISM credential possess the experience and knowledge to deliver effective security management and consulting services. Progent can provide the services of CISM qualified security professionals to help businesses with:
Read more details concerning Progent's CISM Qualified Security Consulting Services.
- IS Security Governance
- Risk Analysis
- IS Security Program Management
- Network Security Management
- Recovery Management
CISSP Accredited Security Engineering Services
The CISSP credential denotes expertise with a worldwide standard for data security. The American National Standards Institute has awarded certification accreditation in the field of data security stipulated by ISO/IEC 17024. Progent offers the services of security experts who have earned CISSP certification. Progent can provide a CISSP-certified professional to help your company in a broad range of security fields including:
Learn more information concerning Progent's CISSP Cybersecurity Support Professionals.
- Security Management Procedures
- Security Infrastructure and Paradigms
- Access Control Systems and Processes
- Applications Development Security
- Secure Operations
- Site Security
- Cryptography Technology
- Telecommunications, LAN and Internet Security
- Business Continuity Planning
CISSP-ISSAP Certified Secure Information System Architecture Engineering Support
Progent's CISSP-ISSAP qualified system architecture professionals are consultants who have earned ISSAP Certification as a result of thorough examination and extensive work with network security design. The ISSAP credential indicates proven skill in the most complex requirements of information system security architecture within the wider field of information security expertise needed for CISSP accreditation. Progent's ISSAP-qualified security consultants can assist your business with all aspects of secure network architecture including.
Read additional information concerning Progent's ISSAP Accredited Secure System Architecture Engineering Expertise.
- Access Management Systems and Methodologies
- Telecom and System Infrastructure Protection
- Cryptography Options
- Needs Evaluation and Security Criteria
- Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
- Site Security
CISA Qualified Information System Security Auditing Engineering Services
The Certified Information Systems Auditor accreditation is a globally recognized qualification that indicates expertise in IS security auditing. Certified by ANSI, the CISA credential has consultants undergo an extensive examination given by the ISACA international professional association. Progent's CISA-qualified information security audit consultants can assist your company in the areas of:
Get additional details concerning Progent's CISA Qualified Information System Security Auditing Consulting Expertise.
- IS Audit Services
- IT Enforcement
- Network Assets and Infrastructure Lifecycle Planning
- IT Service Delivery
- Safeguarding Information Resources
- Disaster Recovery Preparedness
Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC program was established by ISACA to validate an IT professional's ability to plan, implement, and maintain IS control mechanisms to mitigate network risk. Progent offers the expertise of a CRISC-certified engineer to help your company to develop and carry out a business continuity or disaster recovery strategy based on leading practices identified by CRISC and geared to align with your company's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC IT risk mitigation specialists can provide a variety of risk identification services such as:
Get more details concerning Progent's CRISC Risk Management Consultants.
- Collect information and study documentation to help identify major risk scenarios
- Identify legal, regulatory, and business requirements and organizational standards related to your information system to assess their possible influence on your strategic objectives
- Identify potential threats for your operational processes to assist in analyzing your enterprise risk
- Develop a risk awareness program and provide training to make sure your organization appreciate IS risk so they can assist with your risk control process
- Match key risk vectors to related business procedures to help determine risk responsibility
- Validate risk tolerance with executive management and major stakeholders to ensure they match
GIAC Certified IS Security Engineering Assistance
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the knowledge of information technology security engineers. GIAC's mission is to verify that a certified professional possesses the skills necessary to provide services in key areas of system, data, and program security. GIAC certifications are recognized by businesses and government organizations all over the world including and the United States National Security Agency. Progent's GIAC-qualified IS security audit experts can assist your IT organization with:
Find out additional information about Progent's GIAC Information Assurance Services.
- Assessing IT Infrastructure
- Security Incident Handling
- Intrusion Detection
- Web-based Services Security
- SIEM solutions
Talk to a Certified Progent Security Expert
To find out how you can access a Progent security engineer for online or onsite support in Pennsylvania, call 1-800-993-9400 or visit Online Computer Help.
© 2002-2019 Progent Corporation. All rights reserved.