Company information networks in the state of South Carolina can now get prompt and economical online access to Progent's accredited network security professionals to fix the toughest security problems. The cost is reasonable, charges are by the minute, engagement is immediate, and support is unbeatable. Progent also provides help for complex engagements that demand the services of seasoned security engineers with high-level industry certifications.
If your South Carolina organization is based away from larger metropolitan neighborhoods such as Columbia, Charleston, Rock Hill, or Greenville, the availability of nearby certified network security professionals could be problematic when you have a crisis. This can result in lost productivity for your business, upset clients, idle workers, and distracted management. By contacting Progent, you have access to a certified security professional who can deliver help whenever you need it to get your network operating and restore your data.
Progent can assist you in all your efforts to defend your information system with services ranging from network security assessments to developing a company-wide security plan. Progent offers economical support to help businesses of all sizes to configure and maintain secure networks powered by Microsoft Windows and Cisco products and that can include servers and desktops running UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus mobile users with Apple iOS handhelds or Android or Windows Phone devices.
Progent can also assist you to outsource spam blocking and protection from email-borne attacks. Email Guard is Progent's email filtering and encryption solution that incorporates the technology of leading data security vendors to deliver centralized management and comprehensive security for all your email traffic. The powerful architecture of Email Guard managed service integrates cloud-based filtering with an on-premises gateway appliance to offer complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. ProSight Email Guard's Cloud Protection Layer serves as a preliminary barricade and keeps the vast majority of unwanted email from making it to your security perimeter. This reduces your exposure to inbound attacks and saves network bandwidth and storage space. ProSight Email Guard's on-premises gateway device adds a further level of inspection for inbound email. For outbound email, the onsite security gateway provides anti-virus and anti-spam filtering, DLP, and email encryption. The onsite security gateway can also help Exchange Server to monitor and safeguard internal email that stays within your security perimeter.
Progent's certified engineers are accessible online or on site to provide a variety of urgent or project-based IT security services which include:
If your company has an emergency requirement for computer security support, refer to Progent's Emergency Online Technical Help.
- Perform comprehensive security evaluations
- Recuperate quickly after attacks
- Set up firewalls from multiple vendors
- Configure secure solutions for offsite and mobile access
- Install effective applications for automatic protection against viruses, spam and directory harvest attacks
- Develop a comprehensive security strategy with 24x7 monitoring
- Offer outsourced Call Center Services
- Create an effective network backup and restore solution based on Microsoft Data Protection Manager backup/restore capability
Progent's engineers offer advanced support in key fields of computer security including auditing, firewall/VPN support, and advanced security consulting.
Progent's certified security engineers can evaluate the effectiveness of your existing network protection systems by performing exhaustive remote automated analysis via advanced software tools and tested techniques. Progent's experience in administering this service saves your company consulting fees and offers a detailed picture of security holes. The knowledge your company is provided can be used as the foundation of a security plan that can allow your information system to run safely and adapt rapidly to future threats.
Automated Vulnerability Assessment
Progent provides expertise in the use of security analysis software such as Microsoft's MBSA and GFI LANguard Network Security Scanner for economically running a variety of automatic network testing scans to identify possible security holes. Progent has extensive experience with additional network auditing utilities such as NMAP, AMAP, eEye, as well as utilities such as SolarWinds, Netcat, Hydra, and Nikto. Progent can help you to make sense of audit reports and react appropriately.
Progent can show you how to design security into your business processes, install auditing tools, plan and implement a protected system environment, and recommend procedures to maximize the security of your network. Progent's security consultants are ready to show you how to configure a firewall, design secure remote access to email and data, and install VPN. Find out more concerning Progent's network security audits.
Security Inventory Service Bundles for Small Businesses
Progent offers two low-cost security inventory service bundles designed to enable small businesses to get an impartial network security evaluation from a certified security expert. With Progent's External Security Inventory Scan, an engineer administers a comprehensive test of your network from outside your firewall to determine possible risks in the security profile you present to the public. With Progent's Internal Network Security Inventory Checkup, a security expert executes a system scan from an authorized computer inside your company firewall to determine the risk to inside attacks. The two security inventory packages are configured and run from a secured external location. The project is managed by a consultant who has earned high-level security credentials and who generates a report that summarizes and analyzes the information captured by the scan and suggests practical remediation where called for.
Network Intrusion Testing Consulting
Stealth penetration testing is an important component of any successful network security strategy. Progent’s security experts can run extensive intrusion checks without the awareness of your organization's in-house IT resources. Stealth penetration checking uncovers whether existing security defense tools such as intrusion detection alerts and event history analysis are correctly set up and consistently checked. Find out additional information concerning Progent's network security penetration testing consulting.
Firewalls and VPN Support
Progent's expertise in network security technology encompasses in-depth field work with leading firewalls and Virtual Private Network technology offered by a variety of vendors such as Cisco, Microsoft, and CheckPoint. Progent can provide the support of consultants who have earned important networking certifications such as CCIE and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Integration and Debugging
The latest generation of ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide substantially more value than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX firewalls for new installations. After Cisco's acquisition of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be configured to enable Firepower Services, built on Sourcefire's Snort product, which is the world's most popular network intrusion protection system. Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can help you to maintain your existing PIX or Cisco ASA 5500 security appliances or upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your company to design, configure, tune, manage and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. See additional information about ASA Firewalls with Firepower Services configuration and troubleshooting support.
Cisco Security and VPN Engineering Services
Cisco's security and offsite connection technology provide a comprehensive line of manageable security products to help safeguard your local and remote information system. Cisco's VPN product family features switches, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's professional staff of consultants includes field-proven specialists with Cisco's Certified Internetwork Expert and CCNP qualifications who are able to help your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that align best with your business goals. Find out more information about Progent's Consulting Services for Cisco Security and Virtual Private Network Appliances.
Consulting Expertise for Other Firewall and VPN Products
Progent provides small and medium size organizations professional support for Intrusion Protection products and IPsec VPN solutions from major firewall and Virtual Private Network security companies including Check Point Software, Juniper Networks, and SonicWALL. Progent can help you create a comprehensive security plan and select the right technologies from a variety of suppliers to support your security goals while staying within your budget restraints.
Progent's Flat-rate Managed Services for Information Security
Progent's low-cost ProSight line of managed services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates next generation behavior-based analysis technology to guard endpoints as well as servers and VMs against new malware attacks like ransomware and email phishing, which easily get by legacy signature-matching anti-virus products. ProSight ASM safeguards on-premises and cloud-based resources and offers a unified platform to address the entire threat progression including protection, detection, mitigation, cleanup, and forensics. Key features include single-click rollback using Windows VSS and automatic system-wide immunization against newly discovered attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection (ESP) services offer economical in-depth protection for physical servers and VMs, workstations, mobile devices, and Exchange email. ProSight ESP uses contextual security and modern behavior analysis for round-the-clock monitoring and reacting to security threats from all attack vectors. ProSight ESP delivers two-way firewall protection, intrusion alarms, device management, and web filtering via cutting-edge tools incorporated within a single agent accessible from a single control. Progent's security and virtualization consultants can help your business to design and implement a ProSight ESP environment that meets your organization's unique requirements and that allows you demonstrate compliance with legal and industry information protection standards. Progent will assist you specify and implement security policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alarms that require immediate action. Progent's consultants can also assist your company to install and verify a backup and disaster recovery system such as ProSight Data Protection Services (DPS) so you can recover quickly from a potentially disastrous cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Exchange email filtering.
ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services from Progent offer small and mid-sized businesses an affordable end-to-end solution for secure backup/disaster recovery. For a low monthly price, ProSight DPS automates and monitors your backup processes and enables rapid restoration of vital files, applications and VMs that have become lost or corrupted as a result of component failures, software bugs, disasters, human mistakes, or malware attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images/, plus Hyper-V and VMware virtual machine images/. Important data can be protected on the cloud, to an on-promises storage device, or to both. Progent's BDR specialists can deliver advanced expertise to configure ProSight DPS to to comply with regulatory standards like HIPPA, FINRA, PCI and Safe Harbor and, whenever necessary, can assist you to recover your critical information. Learn more about ProSight DPS Managed Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the technology of leading information security companies to provide web-based control and world-class protection for your inbound and outbound email. The powerful structure of Email Guard managed service combines cloud-based filtering with an on-premises security gateway device to provide complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. Email Guard's cloud filter serves as a preliminary barricade and blocks the vast majority of unwanted email from making it to your security perimeter. This reduces your vulnerability to external attacks and conserves network bandwidth and storage. Email Guard's on-premises gateway device provides a deeper level of analysis for incoming email. For outgoing email, the onsite security gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also help Microsoft Exchange Server to monitor and safeguard internal email that originates and ends inside your corporate firewall. For more information, see Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small organization can have its key servers and apps hosted in a protected fault tolerant data center on a fast virtual host configured and maintained by Progent's network support experts. Under Progent's ProSight Virtual Hosting model, the customer retains ownership of the data, the operating system software, and the apps. Since the environment is virtualized, it can be ported easily to an alternate hardware environment without a time-consuming and technically risky configuration process. With ProSight Virtual Hosting, you are not locked into one hosting provider. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, maintain, retrieve and safeguard information related to your IT infrastructure, procedures, applications, and services. You can instantly locate passwords or serial numbers and be warned about impending expirations of SSL certificates ,domains or warranties. By cleaning up and managing your IT infrastructure documentation, you can eliminate as much as half of time spent looking for critical information about your IT network. ProSight IT Asset Management features a centralized repository for holding and sharing all documents required for managing your business network such as standard operating procedures and How-To's. ProSight IT Asset Management also supports advanced automation for gathering and relating IT information. Whether you’re planning enhancements, performing maintenance, or responding to an emergency, ProSight IT Asset Management delivers the information you require as soon as you need it. Find out more details about Progent's ProSight IT Asset Management service.
Expert Network Security Design
Any company should develop a carefully thought out security strategy that incorporates both pre-attack procedures and response plans. The pre-attack plan is a set of steps designed to minimize vulnerabilities. The post-attack plan assists your company's security personnel to evaluate the impact caused by an attack, repair the system, record the event, and get the IT network running as soon as feasible.
Progent's certified IS security consultants are available to assist your company to run a full vulnerability assessment and create a network security plan to establish security policies and controls to mitigate ongoing attacks and threats.
CISM Accredited System Security Consulting Services
The CISM organization defines the basic capabilities and global standards of skill that information security managers are expected to learn. It provides business management the assurance that consultants who have qualified for their CISM credential possess the experience and knowledge to deliver efficient security administration and consulting consulting. Progent can provide the services of CISM certified security professionals to assist companies with:
Find out more details concerning Progent's CISM Qualified Security Support Expertise.
- IS Security Processes
- Risk Management
- Network Security Implementation Management
- Network Security Management
- Recovery Planning
CISSP Certified Security Engineering Assistance
CISSP certification recognizes expertise with an international standard for network security. ANSI (American National Standards Institute) has awarded the CISSP credential recognition in the area of data protection defined by ISO/IEC 17024. Progent offers access to of security professionals who have earned CISSP accreditation. Progent can provide a CISSP-certified consultant to help your enterprise in a variety security areas including:
Learn additional information about Progent's CISSP Accredited Cybersecurity Consulting Expertise.
- Security Administration Practices
- Security Architecture and Paradigms
- Access Management Systems and Processes
- Applications Development Security
- Operations Security
- Site Security
- Data Encryption Mechanisms
- Telecommunications, LAN and WAN Security
- Business Continuity Preparedness
CISSP-ISSAP Certified Secure System Architecture Engineering Support
Progent's CISSP-ISSAP qualified network architecture professionals are consultants who have earned ISSAP status through rigorous examination and extensive work with information security architecture. The ISSAP certification represents proven skill in the most complex requirements of information system security architecture bounded by the broader field of IS security expertise required for CISSP accreditation. Progent's ISSAP-qualified security experts can assist your company with all phases of secure network architecture such as.
Learn additional information about Progent's ISSAP Qualified Secure Information System Architecture Engineering Services.
- Access Management Systems and Methodologies
- Phone System and Network Infrastructure Security
- Encryption/Decryption Options
- Requirements Evaluation and Security Standards
- Business Continuity Planning (BCP) and DRP
- Site Security
CISA Certified Information System Security Auditing Consulting Support
The Certified Information Systems Auditor (CISA) accreditation is a recognized achievement that indicates expertise in information system security audit and control. Certified by the American National Standards Institute, the CISA credential has consultants undergo an extensive examination administered by the ISACA professional association. Progent's CISA-certified IS security audit specialists can help your company with:
Get the details about Progent's CISA Qualified Network Security Auditing Engineering Support.
- IS Audit Services
- IT Governance
- Network Assets and Infrastructure Lifecycle Planning
- IT Support
- Safeguarding Information Resources
- Business Continuity Planning
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA in 2010 to verify an IT professional's ability to plan, implement, and support information system control mechanisms to mitigate risk. Progent offers the expertise of a CRISC-certified engineer to assist you to develop and execute a workplace continuity or disaster recovery strategy based on leading practices identified by CRISC and geared to align with your company's risk tolerance, business goals, and IT budget. Progent's CRISC-qualified network risk mitigation consultants can provide a variety of risk evaluation services such as:
Learn more information concerning Progent's CRISC Risk Management Consultants.
- Gather data and review documentation to evaluate major risk scenarios
- Identify statutory, industry, and contractual requirements and company standards related to your information system to assess their possible impact on your business objectives
- Identify possible threats for your operational workflows to assist in evaluating your corporate risk
- Create a risk awareness program and conduct training to make sure your stakeholders understand IT risk so they can assist with your risk control program
- Connect identified risk scenarios to related business processes to help assign risk ownership
- Validate risk tolerance with your senior management and major stakeholders to make sure they align
GIAC Certified IS Security Consulting Services
Global Information Assurance Certification was founded in 1999 to validate the knowledge of information technology security engineers. GIAC's goal is to ensure that an accredited professional has the skills needed to deliver support in critical areas of system, data, and program security. GIAC certifications are acknowledged by companies and government organizations around the world including and the United States National Security Agency (NSA). Progent's GIAC information security audit consultants can assist your IT organization in the areas of:
Find out additional information concerning Progent's GIAC Information Assurance Expertise.
- Auditing Networks
- Security Incident Handling
- Intrusion Detection
- Web-based Services Security
- SIEM solutions
Talk to a Certified Security Engineer
To see how you can get in touch with a certified security consultant for online or on-premises support in South Carolina, call 1-800-993-9400 or visit Online Network Help.