Small business information networks in the state of Utah can depend on fast and affordable online technical support from Progent's certified network security consultants to assist with the toughest security issues. The cost is affordable, billing is by the minute, sign-up is quick, and service is unbeatable. Progent also provides help for complex engagements that demand the services of seasoned security consultants with high-level security certifications.
In case your Utah office is located outside of more populated metropolitan areas including Salt Lake City, West Valley City, Provo, Sandy, or Orem, help from nearby accredited security professionals may be limited when you have a crisis. This could mean a drop in revenue for your business, angry customers, unproductive workers, and defocused management. By utilizing Progent, you can get in touch with a certified security professional who can deliver expertise when you need it to keep your system running and salvage your information.
Progent can help you in a variety of ways in your initiatives to guard your network with support services ranging from network security checks to creating a comprehensive security strategy. Progent offers affordable support to assist companies of any size to configure and maintain protected networks powered by Microsoft Windows and Cisco technology and that can include computers running UNIX, Linux, Solaris, or Apple Mac OS X platforms plus mobile users with Apple iOS iPhones and iPads or Android or Windows Phone devices.
Progent can also help you outsource spam blocking and protection from e-mail-based assaults. Email Guard is Progent's email security solution that incorporates the services and infrastructure of leading data security vendors to provide centralized control and comprehensive protection for all your inbound and outbound email. The powerful architecture of Progent's Email Guard integrates cloud-based filtering with a local security gateway device to offer complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. ProSight Email Guard's cloud filter acts as a preliminary barricade and blocks most unwanted email from reaching your security perimeter. This reduces your exposure to inbound attacks and conserves system bandwidth and storage. ProSight Email Guard's on-premises gateway device adds a deeper layer of inspection for incoming email. For outbound email, the onsite gateway provides anti-virus and anti-spam filtering, protection against data leaks, and encryption. The local security gateway can also enable Exchange Server to monitor and safeguard internal email that stays inside your security perimeter.
Progent's security professionals are available remotely or in person to provide a range of emergency or longer-term network security services which include:
If your company has an urgent requirement for computer security support, go to Progent's Emergency Remote Network Help.
Progent's consultants can deliver advanced services in key areas of computer security that include analysis, firewall and VPN expertise, and high-level security consulting.
Progent's certified security engineers can evaluate the strength of your existing computer security systems by performing comprehensive remote automated testing via advanced software tools and proven techniques. Progent's skill in administering this testing saves your company time and money and assures an accurate portrayal of weaknesses. The knowledge your IT organization is provided can be used as the foundation of a security strategy that will allow your network to run dependably and adapt rapidly to future risks.
Automated Network Vulnerability Assessment
Progent provides consulting in the application of security evaluation products such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard for affordably running a variety of programmed network auditing checks to identify possible security vulnerabilities. Progent has broad experience with other network analysis products including NMAP, AMAP application mapper, eEye Vulnerability Scanner, plus utilities like Metasploit, Netcat, and Nikto. Progent can show you how to understand audit reports and respond appropriately.
Progent can show you how to design security into your business operations, configure auditing tools, plan and implement a protected system environment, and recommend procedures to maximize the safety of your network. Progent's security engineers are ready to assist you to set up a firewall, design safe remote connectivity to email and business applications, and integrate virtual private network. Find out more about Progent's automated security assessment.
Security Inventory Packages for Small Companies
Progent has put together two low-cost security inventory service packages designed to enable small companies to receive an independent security assessment from an accredited security specialist. With Progent's External Network Security Inventory Scan, an engineer administers an extensive examination of your network from beyond your firewall to determine potential risks in the security profile you expose to the outside world. With Progent's Internal Security Inventory Checkup, a security engineer runs a network scan from a secure computer inside your firewall to assess your exposure to inside threats. Both security inventory services are set up and run from a secured remote location. The process is directed by an engineer who has earned top security accreditations and who generates a report that details and analyzes the information captured by the scan and suggests practical improvements if called for.
Stealth Intrusion Analysis Support Services
Stealth intrusion testing is an important component of any successful IT system security strategy. Progent’s security experts can perform thorough intrusion checks without the awareness of your company's internal network support staff. Stealth penetration testing uncovers whether current security defense systems such as intrusion incident warnings and event log monitoring are correctly configured and consistently monitored. Learn additional information concerning Progent's network security penetration testing support services.
Firewall And Virtual Private Network (VPN) Support
Progent's background in security solutions encompasses extensive familiarity with leading firewalls and VPN technology from multiple companies such as Cisco, Microsoft, and Juniper. Progent offers the services of engineers with key networking accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Integration and Debugging
Progent's Low-Cost Managed Services for Information Assurance
The new ASA 5500-X Series of firewalls with Firepower Services provide significantly more bang for the buck than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new installations. After Cisco's acquisition of Sourcefire, the whole line of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed intrusion protection system (IPS). Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can assist you to maintain your legacy PIX or ASA 5500 firewalls and migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your company to plan, deploy, optimize, manage and debug firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. See additional details about ASA 5500-X Firewalls with Firepower integration and debugging services.
Cisco Network Security and VPN Support Expertise
Cisco's network security and offsite access products offer a complete range of easy-to-administer security solutions to help safeguard your wired and wireless information system. Cisco's Virtual Private Network line features switches, firewalls, intrusion detection systems and VPN concentrators. Progent's professional staff of consultants includes field-proven engineers with Cisco CCIE and CCNP certifications who are able to help your company to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that align best with your company goals. Find out more details concerning Progent's Engineering Services for Cisco Security and VPN Appliances.
Support Services for Other Firewall and VPN Technology
Progent provides small and mid-size businesses expert consulting for Intrusion Protection products and IPsec VPN technology from major firewall and Virtual Private Network security companies including Check Point Software, Juniper Networks, and SonicWALL. Progent can help you design a detailed security plan and choose the right products from a variety of vendors to achieve your security objectives while staying within your spending restraints.
Progent's value-priced ProSight family of network management outsourcing services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
Certified Network Security Consulting
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes cutting edge behavior machine learning technology to guard endpoints and servers and VMs against new malware assaults such as ransomware and file-less exploits, which easily evade traditional signature-matching AV tools. ProSight ASM protects local and cloud resources and offers a single platform to manage the entire malware attack lifecycle including protection, detection, mitigation, remediation, and forensics. Key capabilities include single-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against new threats. Find out more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) services offer ultra-affordable in-depth security for physical servers and VMs, desktops, smartphones, and Microsoft Exchange. ProSight ESP utilizes contextual security and advanced heuristics for round-the-clock monitoring and responding to cyber threats from all attack vectors. ProSight ESP delivers two-way firewall protection, intrusion alarms, device management, and web filtering through leading-edge technologies packaged within one agent accessible from a unified console. Progent's data protection and virtualization experts can help your business to plan and configure a ProSight ESP environment that addresses your company's unique needs and that allows you prove compliance with legal and industry information security standards. Progent will assist you define and configure security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alarms that require immediate attention. Progent's consultants can also assist you to set up and test a backup and disaster recovery solution like ProSight Data Protection Services (DPS) so you can get back in business rapidly from a destructive cyber attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Exchange filtering.
ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent offer small and mid-sized organizations a low cost end-to-end service for reliable backup/disaster recovery (BDR). For a low monthly price, ProSight Data Protection Services automates your backup activities and allows fast recovery of vital data, apps and virtual machines that have become unavailable or corrupted due to hardware failures, software glitches, disasters, human error, or malware attacks such as ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, applications, system images/, as well as Microsoft Hyper-V and VMware virtual machine images/. Important data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's backup and recovery specialists can deliver world-class support to set up ProSight DPS to to comply with regulatory requirements such as HIPPA, FINRA, PCI and Safe Harbor and, whenever necessary, can assist you to restore your business-critical data. Learn more about ProSight DPS Managed Cloud Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the infrastructure of top information security vendors to provide web-based management and comprehensive protection for all your email traffic. The hybrid architecture of Progent's Email Guard managed service combines cloud-based filtering with an on-premises security gateway appliance to offer complete protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne malware. The Cloud Protection Layer acts as a preliminary barricade and keeps the vast majority of threats from making it to your network firewall. This reduces your exposure to external threats and saves network bandwidth and storage space. Email Guard's onsite security gateway appliance provides a further level of analysis for incoming email. For outgoing email, the local security gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also help Exchange Server to track and protect internal email traffic that originates and ends within your corporate firewall. For more details, see Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small business can have its key servers and apps hosted in a secure fault tolerant data center on a high-performance virtual host set up and managed by Progent's network support experts. With Progent's ProSight Virtual Hosting model, the customer retains ownership of the data, the OS platforms, and the applications. Since the environment is virtualized, it can be ported immediately to an alternate hardware environment without a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, your business is not locked into a single hosting service. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, update, find and protect information related to your IT infrastructure, procedures, applications, and services. You can quickly locate passwords or serial numbers and be alerted about impending expirations of SSLs or warranties. By cleaning up and organizing your IT documentation, you can save up to half of time spent trying to find vital information about your network. ProSight IT Asset Management features a common location for storing and sharing all documents related to managing your business network like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports advanced automation for collecting and associating IT information. Whether you’re planning enhancements, performing regular maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the information you need the instant you need it. Find out more details about ProSight IT Asset Management service.
Any company should develop a carefully thought out security program that incorporates both pre-attack procedures and response plans. The proactive plan is a collection of procedures designed to reduce security weaknesses. The reactive plan assists your network security personnel to assess the impact resulting from a security penetration, repair the damage, record the experience, and get business functions operational as soon as feasible.
Progent's certified IT security engineers are available to help your company to run a full vulnerability assessment and define a company-wide security plan to implement security processes and mechanisms to mitigate future assaults and threats.
CISM Accredited Network Security Engineering Expertise
The CISM organization describes the basic capabilities and global standards of skill that IT security managers are required to master. It gives executive management the confidence that those who have qualified for their CISM credential have the background and capability to deliver effective security management and support consulting. Progent offers the support of CISM certified security consultants to help businesses with:
Read additional information about Progent's CISM Security Engineering Expertise.
- IS Security Governance
- Vulnerability Management
- Network Security Program Management
- IS Security Management
- Response Planning
CISSP Qualified Security Consulting Support
The CISSP credential recognizes mastery of an international standard for network security. The American National Standards Institute has granted the CISSP credential recognition in the area of information security stipulated by ISO 17024. Progent can provide access to of security experts who have qualified for CISSP certification. Progent can provide a CISSP-certified professional to help your enterprise in a variety security fields including:
Find out additional details concerning Progent's CISSP-certified Cybersecurity Support Expertise.
- Security Administration Practices
- Security Architecture and Models
- Access Control Solutions and Processes
- Applications Development Security
- Operations Security
- Site Security
- Cryptography Technology
- Telecom, LAN and Internet Security
- Disaster Recovery Preparedness
CISSP-ISSAP Certified Secure Information System Architecture Engineering Expertise
Progent's CISSP-ISSAP qualified network architecture professionals are experts who have earned ISSAP Certification as a result of thorough examination and extensive work with network security design. The ISSAP certification indicates proven competence in the more in-depth requirements of IS security architecture within the wider field of IS security knowledge required for CISSP certification. Progent's ISSAP-certified security specialists can assist your company with all phases of secure network architecture including.
Read additional information about Progent's ISSAP Qualified Secure IT Architecture Engineering Expertise.
- Access Control Mechanisms and Techniques
- Telecom and System Infrastructure Protection
- Cryptography Options
- Requirements Evaluation and Security Standards
- Business Continuity Planning and Disaster Recovery Planning
- Site Security
CISA Qualified Information System Security Auditing Engineering Services
The CISA accreditation is a recognized achievement that indicates expertise in information system security audit and control. Accredited by the American National Standards Institute, the CISA credential requires that consultants undergo an extensive test given by the ISACA professional association. Progent's CISA-certified network security audit engineers can help your company in the areas of:
Learn the details about Progent's CISA Qualified Network Security Auditing Consulting Assistance.
- IS Audit Services
- IT Administration
- Network Assets and Infrastructure Lifecycle
- Information Technology Support
- Protecting Information Assets
- Business Continuity Preparedness
Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC program was initiated by ISACA to validate a consultant's ability to plan, deploy, and maintain IS controls to reduce network risk. Progent can provide the services of a CRISC-certified consultant to help you to create and carry out a workplace continuity or disaster recovery strategy based on industry best practices promoted by CRISC and geared to match your company's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC network risk mitigation engineers can provide a variety of risk evaluation services such as:
Get additional details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Gather data and review documentation to identify significant risk scenarios
- Inventory legal, industry, and contractual mandates and company standards related to your network to determine their potential influence on your business goals
- Identify possible vulnerabilities for your business processes to help in evaluating your corporate risk
- Develop a risk awareness program and provide training to make sure your organization understand IT risk so they can contribute to your risk control process
- Connect identified risk vectors to related operational processes to help determine risk ownership
- Determine risk appetite with your senior management and key stakeholders to ensure they align
GIAC Certified Information System Security Engineering Services
Find out additional details about Progent's GIAC Information Assurance Services.
GIAC (Global Information Assurance Certification) was established in 1999 to certify the skill of network security engineers. GIAC's mission is to verify that a certified security consultant possesses the skills necessary to deliver support in key categories of system, data, and program security. GIAC certifications are recognized by businesses and government organizations around the world including and the U.S. National Security Agency. Progent's GIAC information security audit experts are available to help your IT organization with:
Contact a Progent Security Specialist
To find out how you can contact a Progent security engineer for online or onsite help in Utah, call 1-800-993-9400 or visit Online Computer Support.