Business networks in the state of South Dakota can now get quick and economical online technical support from Progent's certified network security professionals to help with urgent security issues. The cost is competitive, billing is per minute, engagement is immediate, and service is unbeatable. Progent also offers help for complex projects that requires the expertise of senior security consultants with top industry certifications.
In case your South Dakota organization is located far from more populated urban neighborhoods including Sioux Falls, Rapid City, or Aberdeen, the availability of nearby certified security consultants may be limited when you have an emergency. This could mean a drop in revenue for your company, upset customers, unproductive workers, and defocused management. By utilizing Progent's online services, you can get in touch with a qualified security consultant ready to deliver help whenever you have to have it to keep your network running and recover your data.
Progent can help you in a variety of ways in your efforts to protect your network with support services ranging from security audits to developing a company-wide security plan. Progent provides affordable support to help companies of any size to configure and manage protected IT environments based on Microsoft Windows and Cisco technology and that can include servers and desktops running UNIX, Linux, Solaris, or Apple Mac OS X operating systems plus mobile clients with Apple iOS iPhones and iPads or Android or Windows Phone handsets.
Progent can also show you how to outsource spam blocking and defense against email-borne assaults. Email Guard is Progent's email security platform that incorporates the services and infrastructure of top data security companies to deliver web-based management and world-class security for all your inbound and outbound email. The powerful structure of Progent's Email Guard managed service integrates cloud-based filtering with a local gateway appliance to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based malware. ProSight Email Guard's cloud filter serves as a first line of defense and blocks most unwanted email from reaching your security perimeter. This reduces your exposure to inbound threats and conserves system bandwidth and storage space. ProSight Email Guard's on-premises gateway appliance provides a further level of analysis for incoming email. For outgoing email, the local security gateway provides anti-virus and anti-spam filtering, protection against data leaks, and encryption. The local security gateway can also help Exchange Server to monitor and safeguard internal email that originates and ends inside your corporate firewall.
Progent's certified experts are available remotely or on site to offer a variety of urgent or longer-term computer security services including:
If your business has an emergency requirement for computer security support, go to Progent's Emergency Remote Network Support.
- Run extensive security audits
- Recover promptly after virus and worm attacks
- Install effective firewalls
- Implement secure methods for remote and mobile access
- Deploy effective solutions for automatic protection against viruses, spam and directory harvest attacks
- Help create a comprehensive security plan with 24x7 monitoring
- Provide comprehensive Help Desk Call Center Services
- Help Create an effective network backup and business continuity solution based on Microsoft DPM backup capability
Progent's consultants offer world-class support in vital areas of network protection including security evaluation, firewall/VPN support, and advanced security consulting.
Progent's expert security consultants can assess the vulnerability of your current network protection environment by performing comprehensive remote automated analysis based on advanced software tools and proven procedures. Progent's experience in this service saves your company time and money and assures a detailed portrayal of system vulnerability. The knowledge your company gains can be used as the foundation of a network protection plan that will allow your network to operate dependably and respond rapidly to future risks.
Automated Security Evaluation
Progent offers consulting in the use of security analysis software including Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard for affordably performing a set of programmed system auditing scans to identify potential security holes. Progent has extensive knowledge of additional network analysis utilities including NMAP, AMAP Application Scanner, eEye, as well as tools such as Metasploit Framework, Netcat, Socat, and Nikto. Progent can show you how to make sense of testing reports and react effectively.
Progent can show you how to build security into your business operations, install auditing software, define and implement a protected network architecture, and suggest policies to maximize the security of your IT system. Progent's security professionals are ready to assist you to configure a firewall, implement secure remote connectivity to email and data, and integrate virtual private network. Find out additional information concerning Progent's automated security analysis.
Security Inventory Scanning Packages for Small Companies
Progent offers two low-cost security inventory scanning packages intended to allow small businesses to get an objective network security assessment from a qualified security expert. With Progent's External Security Inventory Checkup, a security expert administers a comprehensive test of your IT infrastructure from beyond your company firewall to uncover possible risks in the security posture you expose to the public. With Progent's Internal Security Inventory Scan, a certified security professional runs a network scan from an authorized computer inside your company firewall to evaluate vulnerabilities to internal assaults. The two security inventory services are configured and executed from a secured external site. The project is overseen by an engineer with high-level security accreditations and who generates a document that details and interprets the information captured by the security scan and suggests practical improvements where appropriate.
Stealth Intrusion Testing Consulting
Stealth intrusion testing is a key component of any successful network security strategy. Progentís security experts can run thorough penetration checks without the knowledge of your organization's internal network support staff. Unannounced penetration checking uncovers whether existing security defense systems such as intrusion incident alerts and event log analysis are correctly set up and consistently checked. Learn more on Progent's stealth security penetration testing support services.
Progent's expertise in security technology encompasses extensive familiarity with major firewalls and Virtual Private Network (VPN) products offered by multiple vendors including Cisco, Microsoft, and Juniper. Progent can provide the services of consultants who have earned key networking accreditations such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Debugging
The new Cisco ASA 5500-X Family of firewalls with Firepower Services provide substantially more performance than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX 500 firewalls for new installations. Following Cisco's purchase of Sourcefire, the entire family of Cisco ASA 5500-X devices can be configured to support Firepower Services, built on Sourcefire's Snort product, which is the world's most popular network intrusion protection system. Firepower services bring powerful new capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can help your company to maintain your existing PIX or ASA 5500 security appliances or migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite support for ASA 5500-X firewalls with Firepower Services and can help your business to plan, deploy, optimize, administer and troubleshoot firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Read additional details about ASA Firewalls with Firepower Services configuration and troubleshooting support.
Cisco Security and VPN Consulting Services
Cisco's security and offsite access products represent a complete line of manageable security solutions to help safeguard your wired and wireless network infrastructure. Cisco's VPN product family includes routers, firewalls, intrusion detection devices and VPN concentrators. Progent's expert staff of consultants includes experienced specialists with Cisco CCIE and CCNP qualifications who can help your organization to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that fit best with your company objectives. Read more information about Progent's Support Services for Cisco Security and VPN Appliances.
Support Expertise for Additional Firewall and Virtual Private Network Solutions
Progent offers small and mid-size organizations professional consulting for Intrusion Protection Systems and IPsec VPN solutions from major firewall and VPN security vendors such as WatchGuard, Juniper, and SonicWALL. Progent can help you design a comprehensive security plan and choose appropriate products from a variety of suppliers to support your security goals while sticking within your spending limits.
Progent's Low-Cost Managed Services for Information Assurance
Progent's low-cost ProSight series of network management outsourcing services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates next generation behavior machine learning tools to defend endpoints and servers and VMs against new malware assaults such as ransomware and file-less exploits, which easily get by traditional signature-matching AV tools. ProSight Active Security Monitoring safeguards local and cloud resources and provides a single platform to manage the complete threat progression including blocking, infiltration detection, mitigation, cleanup, and forensics. Key features include one-click rollback using Windows VSS and automatic network-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Endpoint Security
ProSight Enhanced Security Protection (ESP) services offer affordable in-depth protection for physical and virtual servers, workstations, smartphones, and Exchange email. ProSight ESP utilizes adaptive security and modern behavior analysis for round-the-clock monitoring and responding to cyber assaults from all attack vectors. ProSight ESP provides firewall protection, intrusion alarms, device management, and web filtering through leading-edge technologies packaged within a single agent managed from a single console. Progent's security and virtualization consultants can assist your business to design and configure a ProSight ESP deployment that addresses your company's specific needs and that helps you prove compliance with government and industry information protection standards. Progent will help you define and configure security policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alarms that call for immediate attention. Progent can also help you to set up and verify a backup and disaster recovery system like ProSight Data Protection Services (DPS) so you can recover rapidly from a potentially disastrous security attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Exchange filtering.
ProSight DPS: Managed Backup
ProSight Data Protection Services offer small and mid-sized organizations an affordable end-to-end service for reliable backup/disaster recovery. Available at a fixed monthly price, ProSight Data Protection Services automates and monitors your backup processes and allows fast restoration of critical files, apps and virtual machines that have become unavailable or corrupted as a result of hardware breakdowns, software bugs, disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, applications, system images/, plus Hyper-V and VMware virtual machine images/. Important data can be protected on the cloud, to a local device, or mirrored to both. Progent's BDR specialists can provide world-class support to set up ProSight Data Protection Services to be compliant with regulatory requirements such as HIPPA, FINRA, PCI and Safe Harbor and, whenever necessary, can assist you to restore your business-critical data. Find out more about ProSight DPS Managed Cloud Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that incorporates the technology of top data security vendors to deliver centralized management and world-class protection for all your email traffic. The hybrid architecture of Progent's Email Guard combines a Cloud Protection Layer with a local gateway appliance to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne malware. Email Guard's Cloud Protection Layer serves as a first line of defense and keeps the vast majority of threats from reaching your network firewall. This decreases your vulnerability to inbound attacks and conserves system bandwidth and storage. Email Guard's onsite gateway device provides a deeper level of inspection for incoming email. For outgoing email, the on-premises security gateway offers anti-virus and anti-spam protection, protection against data leaks, and email encryption. The onsite security gateway can also help Exchange Server to monitor and safeguard internal email that originates and ends within your corporate firewall. For more information, see ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and applications hosted in a protected Tier III data center on a high-performance virtual host configured and maintained by Progent's IT support experts. With the ProSight Virtual Hosting model, the client owns the data, the OS software, and the apps. Because the environment is virtualized, it can be ported easily to a different hardware environment without a time-consuming and difficult configuration procedure. With ProSight Virtual Hosting, you are not tied a single hosting service. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, maintain, find and safeguard data about your network infrastructure, procedures, business apps, and services. You can instantly find passwords or serial numbers and be warned automatically about impending expirations of SSLs ,domains or warranties. By cleaning up and organizing your network documentation, you can save as much as half of time spent trying to find vital information about your IT network. ProSight IT Asset Management includes a common location for holding and collaborating on all documents related to managing your network infrastructure such as standard operating procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and associating IT information. Whether youíre planning improvements, performing regular maintenance, or responding to an emergency, ProSight IT Asset Management gets you the data you require the instant you need it. Learn more about Progent's ProSight IT Asset Management service.
Certified Network Security Consulting
Any company ought to develop a carefully considered security strategy that includes both pre-attack procedures and response plans. The proactive strategy is a set of procedures intended to minimize vulnerabilities. The reactive plan helps your security personnel to evaluate the damage caused by an attack, fix the damage, record the experience, and get business functions running as soon as possible.
Progent's expert IS security engineers can to help your company to run a complete risk evaluation and create a computer security plan to implement security policies and mechanisms to mitigate future assaults and threats.
CISM Certified Security Support Services
The CISM organization defines the basic capabilities and worldwide standards of skill that IT security managers are required to learn. It gives executive management the assurance that consultants who have earned their CISM certification have the experience and knowledge to deliver efficient security administration and consulting consulting. Progent can provide the services of CISM certified security professionals to help businesses with:
Read more information about Progent's CISM Network Security Support Professionals.
- Network Security Governance
- Risk Management
- IS Security Program Management
- Network Security Management
- Recovery Planning
CISSP Accredited Security Consulting Services
CISSP certification denotes mastery of a worldwide standard for data security. ANSI (American National Standards Institute) has awarded certification recognition in the area of information protection under ISO 17024. Progent can provide access to of security consultants who have qualified for CISSP accreditation. Progent can provide a CISSP-certified professional to help your company in a variety security areas such as:
Learn additional information about Progent's CISSP Accredited Security Support Professionals.
- Security Administration Procedures
- Security Infrastructure and Paradigms
- Access Control Systems and Processes
- Software Development Security
- Secure Operations
- Site Security
- Cryptography Technology
- Telecom, Network and WAN Security
- Business Continuity Preparedness
CISSP-ISSAP Certified Secure IT Architecture Consulting Support
Progent's CISSP-ISSAP qualified IT architecture professionals are consultants who have earned ISSAP Certification as a result of thorough testing and significant experience with information security architecture. The Information System Security Architecture Professional (ISSAP) credential indicates proven skill in the more in-depth requirements of IS security architecture within the wider field of IS security knowledge required for CISSP accreditation. Progent's ISSAP-qualified security consultants can help your company with all phases of architecture security including.
Read additional details about Progent's ISSAP Certified Secure Information System Architecture Engineering Services.
- Access Control Mechanisms and Methodologies
- Phone System and System Infrastructure Security
- Data Encryption Solutions
- Requirements Analysis and Security Guidelines
- BCP and Disaster Recovery Planning
- Physical Security
CISA Qualified Information System Security Auditing Engineering Support
The Certified Information Systems Auditor (CISA) accreditation is a prestigious achievement that signifies mastery in IS security audit and control. Accredited by ANSI, the CISA credential requires that candidates undergo a comprehensive examination given by the ISACA professional group. Progent's CISA information security audit engineers can assist your business with:
Read additional details about Progent's CISA Certified Information System Security Auditing Consulting Assistance.
- IS Audit Services
- Information Technology Governance
- Systems and Architecture Planned Useful Life
- IT Support
- Safeguarding Data Assets
- Business Continuity Planning
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA in 2010 to verify an IT professional's ability to design, deploy, and maintain information system controls to reduce risk. Progent offers the expertise of a CRISC-certified engineer to assist your company to create and execute a workplace continuity or disaster recovery strategy based on leading practices identified by CRISC and geared to align with your organization's risk tolerance, business goals, and IT budget. Progent's CRISC-certified network risk management experts offer a range of risk identification services including:
Get additional details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.
- Gather data and study documentation to help identify significant risk scenarios
- Inventory legal, regulatory, and contractual mandates and company policies related to your network to assess their possible impact on your strategic objectives
- Point out potential threats for your business workflows to assist in evaluating your corporate risk
- Create a risk awareness initiative and conduct seminars to ensure your organization appreciate IT risk so they can assist with your risk management process
- Connect key risk scenarios to your associated operational procedures to help assign risk ownership
- Determine risk appetite with your senior leadership and key stakeholders to make sure they are in agreement
GIAC Qualified IS Security Consulting Assistance
Global Information Assurance Certification was founded in 1999 to certify the knowledge of computer security professionals. GIAC's mission is to verify that an accredited professional has the skills necessary to deliver services in vital categories of network, information, and application security. GIAC accreditations are recognized by companies and government organizations around the world including and the U.S. NSA. Progent's GIAC network security audit specialists are available to assist your company with:
Find out additional details concerning Progent's GIAC Information Assurance Expertise.
- Assessing Networks
- Incident Handling
- Intrusion Detection
- Web-based Application Security
- SIEM solutions
Contact a Certified Progent Security Engineer
To learn how you can get in touch with a certified security engineer for online or onsite assistance in South Dakota, call 1-800-993-9400 or visit Online Network Help.
© 2002-2019 Progent Corporation. All rights reserved.