Small business information networks in South Dakota can have prompt and economical remote access to Progent's qualified security support specialists to help with urgent security problems. Rates are affordable, charges are per minute, sign-up is immediate, and support is world class. Progent also provides help for complex engagements that requires the services of seasoned security consultants with top industry credentials.
In case your South Dakota network is away from more populated metropolitan areas such as Sioux Falls, Rapid City, or Aberdeen, access to local qualified security engineers is often limited when you have a security disaster. This can result in lost revenue for your business, upset customers, unproductive workers, and defocused executives. By utilizing Progent's online services, you have access to a qualified security engineer ready to offer help whenever you have to have it to keep your computer network running and restore your information.
Progent can help you in all your initiatives to defend your network with support services ranging from network security checks to creating a comprehensive security plan. Progent offers affordable service to assist small and midsize companies to design and maintain protected IT environments powered by Microsoft Windows and Cisco products and that can include computers based on UNIX, Linux, Sun Solaris, or Mac OS X platforms plus mobile users with Apple iOS iPhones and iPads or Google Android or Windows Phone smart phones and tablets.
Progent can also show you how to outsource spam filtering and protection from e-mail-based assaults. Email Guard is Progent's email security solution that incorporates the technology of leading data security companies to provide centralized control and comprehensive protection for all your email traffic. The hybrid structure of Progent's Email Guard managed service combines a Cloud Protection Layer with an on-premises security gateway appliance to provide complete protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based threats. The cloud filter acts as a preliminary barricade and keeps most unwanted email from reaching your security perimeter. This decreases your exposure to inbound attacks and conserves system bandwidth and storage. ProSight Email Guard's on-premises gateway appliance adds a deeper layer of inspection for inbound email. For outbound email, the local gateway offers anti-virus and anti-spam filtering, DLP, and encryption. The local security gateway can also enable Microsoft Exchange Server to monitor and protect internal email that stays inside your corporate firewall.
Progent's certified consultants are available remotely or on site to offer a range of emergency or project-based computer security services such as:
If your network has an emergency need for computer security help, refer to Progent's Urgent Online Technical Help.
Progent's engineers can deliver advanced services in key fields of computer protection that include auditing, firewall and VPN solutions, and high-level security consulting.
System Security Evaluation
Progent's certified security engineers can evaluate the effectiveness of your current computer security systems by performing comprehensive remote automated analysis based on sophisticated software tools and proven techniques. Progent's skill in this testing saves your company money and offers a detailed portrayal of gaps. The knowledge your IT organization gains can form the foundation of a network protection plan that can allow your network to operate dependably and react quickly to future risks.
Automated Vulnerability Assessment
Progent provides expertise in the application of security testing utilities such as Microsoft Baseline Security Analyzer and GFI LANguard NSS for affordably running a variety of automatic network auditing checks to uncover potential security holes. Progent has extensive experience with additional security analysis tools such as NMAP, AMAP application mapper, eEye, plus utilities such as Metasploit Framework, Netcat, Hydra, and Nikto. Progent can help you to make sense of audit reports and react appropriately.
Progent can help you build protection into your business operations, install scanning applications, plan and deploy a secure network architecture, and recommend procedures to optimize the security of your network. Progent's security engineers are able to show you how to configure a firewall, implement secure remote connectivity to email and data, and install VPN. Find out additional information on Progent's automated security audits.
Security Inventory and Evaluation Packages for Small Businesses
Progent offers two ultra-affordable security inventory service packages designed to allow small companies to get an impartial network security evaluation from a qualified security expert. With Progent's External Security Inventory Checkup, an engineer administers a comprehensive examination of your IT infrastructure from outside your company firewall to determine possible weaknesses in the security profile you expose to the outside world. With Progent's Internal Security Inventory Checkup, an engineer runs a system scan from an authorized computer inside your firewall to evaluate vulnerabilities to inside attacks. Both security inventory services are set up and executed from a secured external location. The project is directed by a consultant who has earned high-level security accreditations and who generates a document that summarizes and analyzes the data collected by the security scan and suggests cost-effective remediation where called for.
Stealth Penetration Testing Support Services
Stealth penetration testing is an important component of any serious IT system security plan. Progent’s security experts can run extensive intrusion checks without the awareness of your company's in-house network support resources. Unannounced penetration testing shows whether existing security monitoring tools such as intrusion detection warnings and event log analysis are correctly set up and actively checked. Find out additional information about Progent's stealth penetration testing support services.
Firewalls and VPN Support
Progent's expertise in network security solutions includes in-depth familiarity with leading firewalls and Virtual Private Network technology from a variety of companies including Cisco, Microsoft, and CheckPoint. Progent can provide the services of consultants with key industry accreditations including CCIE and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Configuration and Troubleshooting
Progent's Low-Cost Managed Services for Information Assurance
The latest generation of ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide significantly more value than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 security appliances for all new deployments. Following Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X devices can be provisioned to support Firepower Services, based on Sourcefire's Snort technology, which is the market's most deployed intrusion protection system. Firepower services provide enhanced capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help your company to manage your existing PIX or Cisco ASA 5500 firewalls or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite help with ASA 5500-X firewalls with Firepower Services and can assist you to plan, integrate, tune, administer and troubleshoot firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Find out additional details about Cisco ASA Firewalls with Firepower Services configuration and debugging support.
Cisco Security and Virtual Private Network Engineering Expertise
Cisco's network security and remote connection technology provide a complete line of manageable security products to help protect your wired and wireless information system. Cisco's Virtual Private Network product family features routers, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's expert staff of consultants includes experienced specialists with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional qualifications who can assist your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that align best with your company objectives. Read additional details concerning Progent's Consulting Expertise for Cisco Security Solutions and VPN Appliances.
Consulting Services for Other Firewall and Virtual Private Network Products
Progent offers small and mid-size businesses professional consulting for Intrusion Protection Systems and IPsec VPN solutions from major firewall and Virtual Private Network security vendors including Check Point Software, Juniper, and SonicWALL. Progent can help you create a comprehensive security strategy and select the right technologies from a variety of vendors to achieve your security goals while sticking within your budget restraints.
Progent's value-priced ProSight portfolio of outsourced network management services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance. Managed services offered by Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
Certified Network Security Planning
ProSight Active Security Monitoring is an endpoint protection service that utilizes cutting edge behavior-based machine learning technology to guard endpoint devices and physical and virtual servers against new malware attacks such as ransomware and email phishing, which easily get by traditional signature-matching anti-virus tools. ProSight ASM protects on-premises and cloud-based resources and offers a unified platform to automate the entire malware attack progression including protection, infiltration detection, mitigation, remediation, and post-attack forensics. Key features include one-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against newly discovered attacks. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) services offer affordable multi-layer protection for physical and virtual servers, desktops, mobile devices, and Microsoft Exchange. ProSight ESP uses contextual security and advanced heuristics for continuously monitoring and responding to cyber assaults from all vectors. ProSight ESP delivers two-way firewall protection, intrusion alarms, endpoint management, and web filtering via leading-edge tools incorporated within one agent accessible from a unified console. Progent's security and virtualization consultants can assist your business to plan and implement a ProSight ESP environment that addresses your company's unique requirements and that allows you demonstrate compliance with legal and industry information security standards. Progent will assist you define and configure security policies that ProSight ESP will manage, and Progent will monitor your network and react to alarms that call for urgent attention. Progent can also assist you to set up and test a backup and disaster recovery solution such as ProSight Data Protection Services (DPS) so you can recover rapidly from a potentially disastrous cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Exchange filtering.
ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services from Progent provide small and mid-sized businesses a low cost and fully managed solution for reliable backup/disaster recovery (BDR). For a fixed monthly price, ProSight Data Protection Services automates your backup activities and enables fast recovery of vital data, apps and VMs that have become unavailable or corrupted due to component failures, software bugs, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images/, as well as Microsoft Hyper-V and VMware images/. Important data can be protected on the cloud, to a local device, or to both. Progent's BDR consultants can deliver advanced support to configure ProSight Data Protection Services to to comply with government and industry regulatory requirements like HIPPA, FIRPA, and PCI and, whenever necessary, can assist you to recover your business-critical information. Learn more about ProSight DPS Managed Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the infrastructure of leading data security vendors to deliver centralized control and world-class protection for your email traffic. The hybrid architecture of Email Guard managed service combines cloud-based filtering with an on-premises security gateway device to offer advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. Email Guard's Cloud Protection Layer serves as a preliminary barricade and blocks the vast majority of threats from making it to your network firewall. This reduces your exposure to external threats and saves system bandwidth and storage. Email Guard's on-premises security gateway appliance adds a deeper level of inspection for inbound email. For outgoing email, the on-premises gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The local security gateway can also help Exchange Server to track and protect internal email traffic that originates and ends within your security perimeter. For more information, see Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its key servers and applications hosted in a protected fault tolerant data center on a fast virtual machine host configured and maintained by Progent's network support professionals. Under the ProSight Virtual Hosting model, the client retains ownership of the data, the operating system software, and the applications. Since the environment is virtualized, it can be ported easily to a different hardware environment without a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, you are not tied a single hosting provider. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, update, retrieve and safeguard data about your network infrastructure, procedures, applications, and services. You can instantly locate passwords or IP addresses and be warned automatically about upcoming expirations of SSLs ,domains or warranties. By cleaning up and organizing your network documentation, you can eliminate up to half of time spent trying to find vital information about your IT network. ProSight IT Asset Management features a centralized repository for storing and collaborating on all documents required for managing your business network such as recommended procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and associating IT data. Whether you’re planning improvements, performing regular maintenance, or responding to an emergency, ProSight IT Asset Management delivers the information you require as soon as you need it. Find out more details about ProSight IT Asset Management service.
Every company ought to have a thoroughly considered security strategy that includes both pre-attack processes and reaction plans. The pre-attack plan is a collection of steps intended to reduce vulnerabilities. The post-attack strategy helps your IT security engineers to evaluate the impact caused by a security penetration, fix the system, document the event, and get the IT network running as quickly as feasible.
Progent's expert IT security engineers can to assist your company to perform a comprehensive risk assessment and create a network security strategy to establish security policies and mechanisms to mitigate ongoing assaults and dangers.
CISM Accredited System Security Engineering Services
The Certified Information Security Manager (CISM) committee describes the basic capabilities and worldwide standards of performance that IT security professionals are required to learn. It gives executive management the confidence that consultants who have earned their CISM certification possess the background and knowledge to deliver effective security management and support services. Progent offers the support of CISM certified security professionals to assist businesses with:
Learn additional details concerning Progent's CISM Certified Information Security Engineering Expertise.
- Information Security Processes
- Vulnerability Management
- Information Security Program Management
- Information Security Management
- Recovery Planning
CISSP Certified Security Engineering Services
The CISSP credential denotes expertise with a worldwide standard for information security. The American National Standards Institute has awarded certification accreditation in the area of information security defined by ISO 17024. Progent can provide the services of security consultants who have qualified for CISSP accreditation. Progent can provide a CISSP-certified expert to help your business in a variety security areas such as:
Read additional details about Progent's CISSP Qualified Security Consulting Expertise.
- Security Management Practices
- Security Architecture and Models
- Access Management Systems and Processes
- Applications Development Security
- Operations Security
- Physical Security
- Cryptography Technology
- Telecommunications, LAN and Internet Security
- Business Continuity Planning
CISSP-ISSAP Certified Secure Information System Architecture Consulting Expertise
Progent's CISSP-ISSAP qualified network architecture engineers are experts who have been awarded ISSAP Certification as a result of rigorous testing and extensive work with network security architecture. The Information System Security Architecture Professional (ISSAP) certification indicates proven competence in the most in-depth requirements of IS security architecture within the broader scope of information security knowledge needed for CISSP certification. Progent's ISSAP-qualified security consultants can assist your company with all aspects of architecture security such as.
Read additional details concerning Progent's ISSAP Qualified Secure Information System Architecture Consulting Professionals.
- Access Control Systems and Techniques
- Telecom and Network Infrastructure Protection
- Cryptography Solutions
- Requirements Analysis and Security Criteria
- Business Continuity Planning (BCP) and DRP
- Physical Security
CISA Qualified Information System Security Auditing Consulting Support
The Certified Information Systems Auditor credential is an important qualification that signifies expertise in IS security audit and control. Certified by ANSI, the CISA accreditation has candidates pass a comprehensive examination administered by the ISACA international professional association. Progent's CISA-certified network security audit experts can help your company in the areas of:
Read more details concerning Progent's CISA Certified Security Auditing Consulting Expertise.
- IS Audit Process
- IT Administration
- Systems and Architecture Lifecycle
- Information Technology Service Delivery
- Safeguarding Information Resources
- Business Continuity Preparedness
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA to verify an IT professional's skills to design, implement, and maintain IS controls to reduce risk. Progent offers the expertise of a CRISC-certified engineer to help you to develop and execute a workplace continuity or disaster recovery strategy that follows industry best practices promoted by CRISC and geared to align with your organization's risk appetite, business objectives, and IT budget. Progent's CRISC IT risk mitigation experts can provide a range of risk assessment services including:
Read more information concerning Progent's CRISC Risk Management Consultants.
- Collect data and review documentation to help identify significant risk scenarios
- Inventory legal, regulatory, and business mandates and company standards related to your network to assess their possible influence on your strategic goals
- Identify potential threats for your operational workflows to help in evaluating your corporate risk
- Create a risk awareness initiative and provide seminars to ensure your organization understand IS risk so they can assist with your risk management program
- Connect key risk vectors to related operational procedures to help assign risk responsibility
- Validate risk appetite with executive management and key stakeholders to ensure they are in agreement
GIAC Qualified Security Engineering Support
GIAC (Global Information Assurance Certification) was established in 1999 to certify the knowledge of computer security engineers. GIAC's goal is to make sure that a certified professional has the skills needed to provide services in important areas of system, information, and application software security. GIAC certifications are acknowledged by companies and government organizations throughout the world including and the United States National Security Agency (NSA). Progent's GIAC-certified security audit consultants are available to help your business in the areas of:
Find out additional information concerning Progent's GIAC Information Assurance Expertise.
- Auditing Perimeters
- Security Incident Handling
- Traffic Analysis
- Web Application Security
- SIEM solutions
Talk to a Certified Progent Security Specialist
To find out how you can contact a certified security consultant for remote or onsite assistance in South Dakota, phone 1-800-993-9400 or go to Remote Network Help.