Company networks in the state of South Carolina can depend on prompt and affordable remote technical support from Progent's qualified network security professionals to resolve the toughest security problems. Rates are affordable, billing is by the minute, engagement is immediate, and support is world class. Progent also offers assistance for complex engagements that demand the services of senior security consultants with high-level security credentials.
In case your South Carolina company is situated far from larger urban areas like Columbia, Charleston, Rock Hill, or Greenville, support from local qualified network security support specialists may be limited during a security disaster. This can cause a drop in revenue for your company, upset customers, idle workers, and defocused management. By utilizing Progent's remote support, you can get in touch with a qualified security professional who can provide help whenever you have to have it to get your system running and restore your data.
Progent can assist you at any level in your efforts to defend your IT environment with support ranging from network security audits to developing a company-wide security strategy. Progent provides economical service to help small and midsize companies to configure and maintain protected networks powered by Windows and Cisco technology and that may include computers running UNIX, Linux, Sun Solaris, or Mac OS X platforms as well as BYOD users with Apple iOS iPhones and iPads or Android or Windows Phone devices.
Progent can also assist you to outsource spam filtering and protection from email-borne attacks. Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of leading data security companies to deliver web-based management and comprehensive protection for your inbound and outbound email. The hybrid structure of Progent's Email Guard combines cloud-based filtering with an on-premises gateway appliance to offer complete defense against spam, viruses, Dos Attacks, DHAs, and other email-based threats. ProSight Email Guard's cloud filter acts as a first line of defense and blocks the vast majority of threats from making it to your network firewall. This decreases your exposure to inbound attacks and saves network bandwidth and storage. ProSight Email Guard's on-premises gateway appliance adds a deeper layer of inspection for incoming email. For outgoing email, the on-premises gateway offers AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite gateway can also help Exchange Server to monitor and safeguard internal email that stays inside your corporate firewall.
Progent's security experts are available remotely or in person to provide a variety of urgent or project-based computer security services such as:
If your business has an urgent need for computer security support, go to Progent's Emergency Online Network Support.
- Perform comprehensive network security evaluations
- Recover promptly after serious security breaches
- Set up hardware and software firewalls
- Configure safe methods for remote and mobile access
- Deploy effective software for automatic protection against spam and directory harvest attacks
- Develop a company-wide security plan with proactive security monitoring
- Provide comprehensive Help Desk Services
- Help Create an effective backup and business continuity strategy centered on Data Protection Manager automated backup technology
Progent's consultants provide advanced services in key areas of network protection that include security evaluation, firewall and VPN solutions, and high-level security consulting.
System Security Assessment
Progent's expert security consultants can evaluate the vulnerability of your existing network protection environment by performing comprehensive remote automated analysis based on advanced software tools and tested techniques. Progent's skill in administering this testing saves you time and money and offers an accurate portrayal of gaps. The information your IT organization is provided can form the basis of a security strategy that can allow your network to operate safely and adapt rapidly to future threats.
Automated Security Evaluation
Progent provides expertise in the use of security auditing products including MBSA and LANguard from GFI for economically performing a set of automatic system auditing checks to uncover possible security weaknesses. Progent has extensive experience with additional network analysis products including NMAP, AMAP Application Scanner, eEye Vulnerability Scanner, plus tools such as SolarWinds, Netcat, Hydra, and Nikto. Progent can show you how to understand audit reports and respond effectively.
Progent can help you build protection into your company processes, install auditing applications, plan and implement a protected system environment, and recommend procedures to maximize the safety of your IT system. Progent's security professionals are ready to assist you to configure a firewall, implement safe remote access to email and business applications, and install VPN. Learn additional information on Progent's network security audits.
Security Inventory Service Bundles for Small Companies
Progent has put together two ultra-affordable security inventory packages intended to allow small companies to get an impartial security evaluation from a certified security specialist. With Progent's External Network Security Inventory Scan, a security expert administers a comprehensive test of your network from beyond your firewalled perimeter to determine possible weaknesses in the security posture you expose to the outside world. With Progent's Internal Security Inventory Checkup, a certified security professional runs a system scan from an authorized computer within your company firewall to assess vulnerabilities to inside threats. Both security inventory services are configured and run from a secured external location. The process is overseen by a consultant with top security credentials and who generates a document that details and analyzes the data captured by the scan and suggests practical remediation if called for.
Network Intrusion Testing Support Services
Stealth penetration checking is an important component of any serious network security plan. Progentís security professionals can run thorough intrusion tests without the knowledge of your organization's in-house network support resources. Stealth penetration checking uncovers whether current security defense systems such as intrusion detection alerts and event log monitoring are properly configured and consistently checked. Learn more on Progent's network security penetration testing consulting.
Progent's background in network security solutions encompasses extensive field work with leading firewalls and VPN products offered by a variety of vendors including Cisco, Microsoft, and Juniper. Progent can provide the services of engineers with important industry accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Configuration and Troubleshooting
Progent's Fixed-price Managed Services for Information Security
The current Cisco ASA 5500-X Series of firewalls with Firepower Services offer significantly more performance than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX security appliances for all new deployments. Since Cisco's purchase of Sourcefire, the entire line of ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the market's most popular network intrusion protection system. Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can help your company to maintain your current PIX or ASA 5500 firewalls and migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can help your business to plan, integrate, tune, manage and debug firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Read more details about Cisco ASA Firewalls with Firepower configuration and troubleshooting services.
Cisco Security and VPN Support Services
Cisco's network security and offsite connection technology provide a complete range of manageable security products to help safeguard your wired and wireless information system. Cisco's Virtual Private Network product family includes routers, firewalls, intrusion detection systems and VPN concentrators. Progent's expert staff of consultants includes experienced engineers with Cisco CCIE and CCNP qualifications who are able to assist your company to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that align most closely with your company goals. Read more information concerning Progent's Support Expertise for Cisco Security and Virtual Private Network Appliances.
Support Services for Other Firewall and Virtual Private Network Technology
Progent offers small and medium size businesses professional support for Intrusion Protection products and IPsec VPN solutions from leading firewall and VPN security vendors such as Check Point Software, Juniper, and SonicWALL. Progent can show you how to create a comprehensive security plan and choose the right technologies from a variety of vendors to achieve your security objectives while sticking within your budget limits.
Progent's value-priced ProSight family of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
Certified Network Security Consulting
Progent's ProSight Active Security Monitoring is an endpoint protection service that utilizes next generation behavior-based machine learning technology to defend endpoints as well as physical and virtual servers against modern malware attacks like ransomware and email phishing, which routinely get by traditional signature-based anti-virus products. ProSight ASM safeguards on-premises and cloud resources and provides a single platform to manage the complete malware attack progression including blocking, identification, mitigation, remediation, and forensics. Key capabilities include single-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against new threats. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection services offer ultra-affordable in-depth protection for physical and virtual servers, workstations, mobile devices, and Exchange email. ProSight ESP uses contextual security and modern behavior analysis for continuously monitoring and responding to security threats from all attack vectors. ProSight ESP provides firewall protection, intrusion alarms, endpoint control, and web filtering via cutting-edge technologies incorporated within a single agent managed from a single console. Progent's data protection and virtualization experts can assist you to plan and implement a ProSight ESP environment that addresses your organization's unique requirements and that allows you achieve and demonstrate compliance with legal and industry data security standards. Progent will assist you define and implement policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alarms that call for immediate attention. Progent can also assist you to set up and verify a backup and disaster recovery system like ProSight Data Protection Services so you can get back in business rapidly from a destructive cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Exchange filtering.
ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services offer small and medium-sized organizations an affordable and fully managed solution for secure backup/disaster recovery (BDR). Available at a low monthly rate, ProSight Data Protection Services automates your backup activities and enables fast recovery of vital data, applications and virtual machines that have become unavailable or corrupted as a result of hardware breakdowns, software glitches, disasters, human mistakes, or malware attacks such as ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, apps, system images/, plus Hyper-V and VMware virtual machine images/. Critical data can be protected on the cloud, to an on-promises device, or to both. Progent's backup and recovery consultants can provide world-class expertise to set up ProSight Data Protection Services to be compliant with government and industry regulatory requirements like HIPPA, FIRPA, and PCI and, when needed, can assist you to restore your business-critical information. Find out more about ProSight Data Protection Services Managed Cloud Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the technology of leading data security companies to deliver centralized management and comprehensive protection for your inbound and outbound email. The hybrid structure of Progent's Email Guard combines cloud-based filtering with an on-premises security gateway appliance to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. Email Guard's cloud filter acts as a first line of defense and blocks the vast majority of threats from making it to your security perimeter. This decreases your vulnerability to inbound threats and conserves system bandwidth and storage. Email Guard's on-premises security gateway appliance provides a further layer of inspection for incoming email. For outbound email, the on-premises security gateway provides AV and anti-spam protection, DLP, and email encryption. The local gateway can also assist Exchange Server to track and safeguard internal email traffic that originates and ends within your security perimeter. For more information, visit Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its key servers and apps hosted in a protected fault tolerant data center on a high-performance virtual machine host configured and maintained by Progent's IT support experts. With Progent's ProSight Virtual Hosting model, the client owns the data, the OS software, and the apps. Since the system is virtualized, it can be ported easily to a different hardware solution without requiring a time-consuming and technically risky reinstallation procedure. With ProSight Virtual Hosting, your business is not locked into one hosting service. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, update, retrieve and safeguard information related to your IT infrastructure, procedures, applications, and services. You can instantly find passwords or serial numbers and be alerted about impending expirations of SSLs ,domains or warranties. By updating and organizing your network documentation, you can save as much as half of time wasted trying to find vital information about your IT network. ProSight IT Asset Management includes a centralized repository for holding and sharing all documents required for managing your business network such as standard operating procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for collecting and relating IT information. Whether youíre making enhancements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the information you need when you need it. Learn more about Progent's ProSight IT Asset Management service.
Every business ought to develop a thoroughly considered security strategy that incorporates both preventive processes and response plans. The proactive strategy is a collection of procedures that help to reduce vulnerabilities. The post-attack strategy helps your network security personnel to assess the impact caused by a security penetration, repair the damage, record the event, and get business functions running as rapidly as feasible.
Progent's expert IS security engineers can to assist you to perform a comprehensive risk assessment and create a company-wide security plan to implement security policies and mechanisms to reduce ongoing attacks and threats.
CISM Accredited Network Security Consulting Services
The CISM organization defines the core capabilities and worldwide standards of performance that information security managers are expected to learn. CISM provides business management the assurance that those who have qualified for their CISM credential have the experience and knowledge to deliver effective security management and support services. Progent offers the support of CISM qualified security professionals to assist companies with:
Learn more details about Progent's CISM Network Security Consulting Services.
- Information Security Strategies
- Vulnerability Management
- Network Security Implementation Management
- Information Security Administration
- Response Management
CISSP Qualified Security Consulting Services
The CISSP credential denotes expertise with a global standard for network security. The American National Standards Institute has granted the CISSP credential accreditation in the area of information protection under ISO/IEC 17024. Progent can provide the services of security consultants who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified expert to help your company in a broad range of security fields including:
Read more information about Progent's CISSP Accredited Security Support Expertise.
- Security Management Practices
- Security Architecture and Models
- Access Management Solutions and Methodology
- Applications Development Security
- Secure Operations
- Physical Security
- Cryptography Mechanisms
- Telecommunications, LAN and Internet Security
- Business Continuity Planning
CISSP-ISSAP Qualified Secure IT Architecture Consulting Services
Progent's CISSP-ISSAP qualified network architecture engineers are experts who have earned ISSAP Certification as a result of thorough examination and extensive experience with information security design. The Information System Security Architecture Professional (ISSAP) credential represents demonstrated competence in the most challenging demands of information security architecture within the wider field of information system security expertise needed for CISSP accreditation. Progent's ISSAP-qualified security experts can help your company with all phases of secure network architecture such as.
Find out more information concerning Progent's ISSAP Qualified Secure IT Architecture Engineering Expertise.
- Access Management Mechanisms and Methodologies
- Telecommunications and Network Security
- Data Encryption Options
- Needs Analysis and Security Criteria
- Business Continuity Planning and Disaster Recovery Planning
- Site Security
CISA Accredited Information System Security Auditing Consulting Support
The CISA accreditation is a globally recognized achievement that signifies expertise in network security audit and control. Certified by the American National Standards Institute (ANSI), the CISA accreditation requires that candidates undergo an extensive test administered by the ISACA international professional group. Progent's CISA-certified information security audit specialists are available to assist your IT organization in the areas of:
Learn the details concerning Progent's CISA Certified Information System Security Auditing Consulting Services.
- Information Systems Audit Services
- Information Technology Enforcement
- Systems and Infrastructure Lifecycle
- Information Technology Service Delivery
- Protecting Data Assets
- Business Continuity Planning
Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA in 2010 to verify an IT professional's skills to plan, implement, and maintain information system controls to reduce network risk. Progent offers the services of a CRISC-certified engineer to help you to create and carry out a workplace continuity or disaster recovery plan that follows industry best practices promoted by CRISC and crafted to match your organization's risk appetite, business goals, and budgetary guidelines. Progent's CRISC-qualified IT risk management specialists can provide a range of risk evaluation services including:
Find out more details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Collect information and review documentation to evaluate major risk scenarios
- Identify legal, regulatory, and contractual mandates and organizational standards associated with your network to assess their potential impact on your strategic goals
- Point out possible threats for your operational workflows to assist in analyzing your corporate risk
- Develop a risk awareness initiative and conduct seminars to ensure your organization appreciate IT risk so they can assist with your risk control program
- Connect key risk vectors to your associated operational processes to help assign risk responsibility
- Validate risk tolerance with your senior management and major stakeholders to make sure they match
GIAC Certified Network Security Consulting Services
Read more details concerning Progent's GIAC Information Assurance Services.
Global Information Assurance Certification was founded in 1999 to validate the skill of IT security experts. GIAC's goal is to verify that a certified professional has the skills necessary to provide services in important categories of network, data, and program security. GIAC certifications are recognized by companies and institutions throughout the world including and the United States National Security Agency. Progent's GIAC-qualified information security audit consultants are available to help your company in the areas of:
Get in Touch with a Certified Security Specialist
To find out how to get in touch with a Progent security consultant for online or onsite assistance in South Carolina, call 1-800-993-9400 or visit Remote Network Help.