Company computer networks in Rhode Island can depend on prompt and affordable remote access to Progent's qualified network security consultants to resolve critical security problems. Rates are reasonable, charges are per minute, engagement is quick, and service is world class. Progent also offers help for long-term engagements that demand the services of senior security consultants with top industry certifications.
If your Rhode Island office is based outside of major metropolitan neighborhoods such as Providence, Warwick, or Cranston, support from local accredited security professionals may be problematic when there's a security disaster. This can result in lost productivity for your company, angry clients, idle workers, and defocused management. By calling Progent's remote support, you have access to a qualified security engineer ready to provide help whenever you need it to get your network operating and restore your data.
Progent can help you in a variety of ways in your efforts to guard your IT environment with support services ranging from network security audits to developing a company-wide security strategy. Progent provides affordable service to help businesses of all sizes to configure and maintain safe IT environments based on Windows and Cisco products and that may include computers running UNIX, Linux, Solaris, or Apple Mac OS X operating systems plus mobile clients with Apple iOS iPhones and iPads or Android or Windows Phone smart phones and tablets.
Progent can also assist you to outsource spam blocking and protection from e-mail-based security threats. Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of top information security companies to deliver centralized management and comprehensive protection for your inbound and outbound email. The powerful structure of Email Guard integrates a Cloud Protection Layer with a local gateway device to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. ProSight Email Guard's Cloud Protection Layer acts as a first line of defense and keeps most unwanted email from making it to your security perimeter. This decreases your exposure to external attacks and saves network bandwidth and storage space. ProSight Email Guard's onsite security gateway device adds a further layer of analysis for inbound email. For outgoing email, the onsite gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and encryption. The on-premises security gateway can also enable Exchange Server to monitor and protect internal email that stays within your corporate firewall.
Progent's certified consultants are accessible remotely or on premises to provide a range of urgent or longer-term computer security services such as:
If your business has an immediate requirement for IT security support, go to Progent's Urgent Online Technical Help.
- Perform extensive network security audits
- Recuperate rapidly after serious security breaches
- Install effective firewalls
- Implement secure methods for offsite and mobile connectivity
- Deploy effective utilities for protection against spam and DHAs
- Develop a company-wide security plan with proactive monitoring
- Provide comprehensive Help Desk Services
- Develop a practical network backup and restore plan built around Data Protection Manager backup/restore technology
Progent's security experts provide advanced services in key facets of computer protection including security evaluation, firewall and VPN solutions, and high-level security consulting.
System Security Assessment
Progent's certified security consultants can evaluate the strength of your existing computer protection systems through exhaustive remote automated testing based on sophisticated utilities and proven procedures. Progent's experience in this service saves your company consulting fees and assures a detailed portrayal of weaknesses. The information your business is provided can make up the basis of a network protection strategy that can allow your information system to operate dependably and adapt quickly to future threats.
Automated Vulnerability Audits
Progent provides expertise in the use of security evaluation software such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard Network Security Scanner for economically performing a set of automatic network testing checks to uncover possible security weaknesses. Progent has broad experience with additional security auditing utilities including NMAP, AMAP, eEye Vulnerability Scanner, as well as utilities such as Metasploit, Hydra, and Nikto. Progent can help you to make sense of audit reports and respond appropriately.
Progent can show you how to build protection into your business operations, configure auditing tools, define and implement a secure network architecture, and recommend policies to maximize the safety of your network. Progent's security engineers are available to show you how to configure a firewall, design secure remote access to email and business applications, and integrate VPN. Learn additional information on Progent's network security evaluation.
Security Inventory Scanning Bundles for Small Businesses
Progent offers two ultra-affordable security inventory service bundles designed to allow small companies to get an impartial network security assessment from an accredited security consultant. With Progent's External Network Security Inventory Checkup, a security expert runs an extensive examination of your IT infrastructure from beyond your company firewall to determine potential risks in the security profile you present to the public. With Progent's Internal Network Security Inventory Checkup, an engineer runs a network scan from an authorized machine within your company firewall to assess the risk to internal threats. The two security inventory packages are set up and executed from a secured external location. The process is overseen by a consultant with high-level security credentials and who produces a document that summarizes and analyzes the data collected by the security scan and suggests practical remediation where called for.
Network Security Penetration Analysis Consulting
Stealth penetration checking is an important component of any serious IT system security plan. Progent’s security professionals can run thorough penetration tests without the knowledge of your company's in-house network support staff. Stealth penetration checking shows whether existing security defense systems such as intrusion detection warnings and event log monitoring are correctly set up and actively monitored. Learn more concerning Progent's network security penetration testing support services.
Firewall And Virtual Private Network (VPN) Solutions
Progent's expertise in security solutions encompasses in-depth familiarity with leading firewalls and Virtual Private Network technology from a variety of companies such as Cisco, Microsoft, and CheckPoint. Progent offers the support of engineers who have earned key industry certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Configuration and Troubleshooting
The latest generation of Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver substantially more value than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX firewalls for all new installations. After Cisco's purchase of Sourcefire, the whole family of ASA 5500-X devices can be configured to enable Firepower Services, built on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system. Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help you to maintain your current PIX or ASA 5500 firewalls or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your company to design, integrate, tune, administer and debug firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. See additional information about Cisco ASA 5500-X Firewalls with Firepower Services configuration and debugging support.
Cisco Network Security and VPN Consulting Services
Cisco's security and offsite access products offer a complete range of manageable security products to help safeguard your wired and wireless information system. Cisco's Virtual Private Network product family includes routers, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's professional staff of consultants includes experienced engineers with Cisco CCIE and CCNP qualifications who are able to help your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that align most closely with your business goals. Find out more information concerning Progent's Support Services for Cisco Security Technology and Virtual Private Network Appliances.
Consulting Expertise for Additional Firewall and Virtual Private Network Solutions
Progent provides small and mid-size businesses expert consulting for Intrusion Protection products and IPsec VPN technology from major firewall and VPN security vendors such as Check Point Software, Juniper, and SonicWALL. Progent can show you how to design a detailed security plan and choose the right products from multiple suppliers to achieve your security goals while sticking within your budget restraints.
Progent's Low-Cost Managed Services for Information Assurance
Progent's affordable ProSight series of network management outsourcing services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that utilizes next generation behavior-based machine learning tools to defend endpoints and physical and virtual servers against modern malware assaults such as ransomware and file-less exploits, which easily get by traditional signature-based AV products. ProSight Active Security Monitoring protects local and cloud-based resources and provides a unified platform to manage the complete threat progression including blocking, identification, containment, remediation, and forensics. Top capabilities include one-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) managed services offer affordable in-depth protection for physical servers and virtual machines, desktops, smartphones, and Exchange Server. ProSight ESP uses adaptive security and advanced heuristics for round-the-clock monitoring and responding to security threats from all vectors. ProSight ESP provides two-way firewall protection, penetration alarms, endpoint management, and web filtering via leading-edge technologies incorporated within a single agent accessible from a unified console. Progent's security and virtualization consultants can assist your business to design and configure a ProSight ESP environment that addresses your organization's unique needs and that allows you prove compliance with government and industry information security regulations. Progent will help you define and implement security policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alerts that call for immediate attention. Progent's consultants can also assist your company to install and verify a backup and restore system like ProSight Data Protection Services so you can get back in business rapidly from a destructive security attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Microsoft Exchange email filtering.
ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services from Progent provide small and medium-sized organizations a low cost and fully managed solution for reliable backup/disaster recovery (BDR). For a fixed monthly price, ProSight Data Protection Services automates your backup activities and allows rapid recovery of vital data, applications and virtual machines that have become unavailable or damaged as a result of hardware failures, software bugs, disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, applications, system images/, as well as Microsoft Hyper-V and VMware images/. Important data can be backed up on the cloud, to a local storage device, or to both. Progent's backup and recovery specialists can deliver advanced support to configure ProSight DPS to to comply with regulatory standards such as HIPPA, FIRPA, and PCI and, whenever necessary, can help you to restore your critical information. Find out more about ProSight DPS Managed Cloud Backup and Recovery.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the infrastructure of top information security companies to provide centralized control and world-class security for your email traffic. The powerful structure of Email Guard managed service integrates a Cloud Protection Layer with a local security gateway device to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. Email Guard's cloud filter serves as a preliminary barricade and keeps the vast majority of unwanted email from making it to your security perimeter. This decreases your vulnerability to inbound attacks and saves system bandwidth and storage. Email Guard's onsite gateway device adds a deeper layer of inspection for incoming email. For outbound email, the local security gateway offers anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The onsite security gateway can also help Microsoft Exchange Server to track and safeguard internal email that stays inside your corporate firewall. For more information, visit ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its critical servers and applications hosted in a secure fault tolerant data center on a fast virtual host set up and managed by Progent's IT support experts. With Progent's ProSight Virtual Hosting model, the client owns the data, the OS platforms, and the apps. Because the system is virtualized, it can be moved easily to an alternate hosting environment without requiring a lengthy and technically risky configuration process. With ProSight Virtual Hosting, your business is not locked into a single hosting service. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, find and protect information related to your IT infrastructure, processes, business apps, and services. You can quickly find passwords or serial numbers and be alerted automatically about impending expirations of SSLs ,domains or warranties. By updating and managing your IT infrastructure documentation, you can save as much as 50% of time thrown away searching for vital information about your IT network. ProSight IT Asset Management includes a centralized location for holding and sharing all documents related to managing your network infrastructure like standard operating procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for gathering and associating IT data. Whether you’re planning improvements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the information you require as soon as you need it. Learn more details about Progent's ProSight IT Asset Management service.
Certified Security Consulting
Every business ought to have a thoroughly thought out security program that includes both proactive processes and response planning. The proactive plan is a collection of mechanisms intended to minimize vulnerabilities. The reactive plan assists your network security personnel to evaluate the damage resulting from a security penetration, repair the network, record the event, and get business functions running as rapidly as possible.
Progent's expert IT security consultants are available to help your company to perform a complete vulnerability assessment and create a network security plan to implement security policies and mechanisms to reduce future attacks and threats.
CISM Accredited System Security Consulting Expertise
The Certified Information Security Manager (CISM) organization defines the core capabilities and global standards of performance that information security professionals are required to learn. It provides business management the assurance that consultants who have earned their CISM certification possess the background and capability to deliver efficient security administration and support consulting. Progent can provide the support of CISM qualified security consultants to assist businesses with:
Learn additional information concerning Progent's CISM IS Security Support Professionals.
- IS Security Governance
- Vulnerability Analysis
- IS Security Program Management
- Information Security Management
- Response Management
CISSP Qualified Security Engineering Support
The CISSP credential denotes expertise with a global standard for information security. The American National Standards Institute has granted certification accreditation in the area of data protection defined by ISO 17024. Progent offers access to of security professionals who have earned CISSP certification. Progent can provide a CISSP-certified professional to help your company in a broad range of security areas including:
Read more details about Progent's CISSP Network Security Support Expertise.
- Security Management Practices
- Security Architecture and Models
- Access Control Solutions and Processes
- Software Development Security
- Secure Operations
- Physical Security
- Data Encryption Technology
- Telecom, Network and Internet Security
- Disaster Recovery Planning
CISSP-ISSAP Certified Secure Network Architecture Consulting Assistance
Progent's CISSP-ISSAP qualified network architecture professionals are experts who have been awarded ISSAP Certification through thorough testing and significant work with information security architecture. The Information System Security Architecture Professional (ISSAP) credential represents demonstrated mastery in the most complex demands of IS security architecture bounded by the wider scope of IS security expertise required for CISSP accreditation. Progent's ISSAP-qualified security consultants can help your business with all aspects of secure network architecture including.
Read more details about Progent's ISSAP Certified Secure IT Architecture Engineering Expertise.
- Access Management Mechanisms and Techniques
- Phone System and Network Security
- Cryptography Options
- Requirements Analysis and Security Guidelines
- Business Continuity Planning and DRP
- Hardware Security
CISA Certified Network Security Auditing Engineering Services
The Certified Information Systems Auditor credential is a prestigious qualification that signifies expertise in network security auditing. Accredited by the American National Standards Institute (ANSI), the CISA accreditation has candidates pass an extensive test administered by the ISACA professional group. Progent's CISA-certified information security audit engineers are available to assist your business with:
Get additional details about Progent's CISA Qualified Security Auditing Consulting Services.
- Information Systems Audit Services
- Information Technology Governance
- Network Assets and Architecture Planned Useful Life
- Information Technology Support
- Safeguarding Data Resources
- Business Continuity Planning
Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC program was established by ISACA in 2010 to verify an IT professional's ability to plan, deploy, and support information system control mechanisms to mitigate network risk. Progent offers the expertise of a CRISC-certified consultant to help you to create and execute a workplace continuity strategy based on industry best practices identified by CRISC and crafted to align with your organization's risk tolerance, business goals, and IT budget. Progent's CRISC IT risk mitigation specialists can provide a range of risk assessment services such as:
Find out additional details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Collect data and review documentation to identify significant vulnerabilities
- Identify statutory, regulatory, and contractual mandates and company standards related to your network to determine their possible influence on your business objectives
- Point out potential vulnerabilities for your operational processes to assist in evaluating your corporate risk
- Create a risk awareness initiative and conduct seminars to make sure your stakeholders understand information system risk so they can contribute to your risk control program
- Match key risk scenarios to related business procedures to help assign risk responsibility
- Validate risk tolerance with executive management and major stakeholders to make sure they are in agreement
GIAC Qualified Network Security Consulting Services
GIAC was founded in 1999 to validate the skill of information technology security professionals. GIAC's goal is to ensure that a certified professional possesses the knowledge necessary to provide services in key areas of system, information, and application security. GIAC accreditations are recognized by companies and institutions around the world including and the United States National Security Agency. Progent's GIAC-certified security audit consultants can assist your IT organization with:
Find out additional information concerning Progent's GIAC Information Assurance Services.
- Assessing Perimeters
- Security Incident Response
- Intrusion Detection
- Web Services Security
- SIEM solutions
Contact a Certified Progent Security Engineer
To learn how to contact a certified Progent security consultant for remote or onsite assistance in Rhode Island, phone 1-800-993-9400 or go to Online Computer Support.