Business computer networks in the state of Vermont can have quick and economical remote technical support from Progent's certified network security engineers to fix urgent security issues. Rates are competitive, billing is by the minute, sign-up is immediate, and support is world class. Progent also offers assistance for complex engagements that demand the expertise of seasoned security consultants with high-level industry credentials.
In case your Vermont small business is located outside of major urban areas like Burlington, Rutland, or Montpelier, support from local certified security professionals could be limited during an emergency. This could mean a loss of productivity for your company, upset customers, unproductive workers, and distracted executives. By utilizing Progent's remote support, you have access to a qualified security engineer who can offer help whenever you have to have it to keep your network operating and salvage your data.
Progent can help you in a variety of ways in your efforts to guard your network with support ranging from security checks to creating a company-wide security plan. Progent provides economical service to assist businesses of all sizes to set up and manage protected networks based on Microsoft Windows and Cisco products and that can include computers running UNIX, Linux, Solaris, or Apple Mac OS X operating systems plus mobile clients with Apple iOS iPhones and iPads or Android or Windows Phone devices.
Progent can also help you outsource spam filtering and protection from email-borne assaults. Email Guard is Progent's email security solution that uses the technology of leading information security companies to deliver centralized control and world-class security for your inbound and outbound email. The hybrid structure of Email Guard managed service integrates cloud-based filtering with a local security gateway device to provide complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The Cloud Protection Layer acts as a preliminary barricade and blocks the vast majority of unwanted email from making it to your network firewall. This decreases your vulnerability to inbound threats and conserves network bandwidth and storage space. ProSight Email Guard's on-premises gateway device provides a deeper layer of analysis for inbound email. For outbound email, the on-premises security gateway offers anti-virus and anti-spam protection, DLP, and encryption. The onsite security gateway can also enable Microsoft Exchange Server to track and protect internal email traffic that originates and ends inside your security perimeter.
Progent's security experts are available online or on premises to provide a range of urgent or longer-term network security services including:
If your network has an immediate need for IT security support, refer to Progent's Urgent Online Technical Support.
- Perform extensive security evaluations
- Recover promptly after virus and worm attacks
- Set up and troubleshoot firewalls
- Configure secure methods for offsite and mobile access
- Install effective utilities for protection against spam and directory harvest attacks
- Help create a comprehensive security plan with 24x7 security monitoring
- Provide comprehensive Call Center Support
- Help Create an effective backup and restore solution based on Data Protection Manager backup capability
Progent's engineers offer world-class support in key fields of computer protection including security assessment, firewall and VPN expertise, and high-level security planning.
Progent's certified security engineers can evaluate the vulnerability of your current computer protection environment through exhaustive remote automated testing via sophisticated software tools and tested techniques. Progent's skill in this testing saves your company time and money and offers an objective portrayal of weaknesses. The information your business gains can be used as the basis of a security strategy that will permit your information system to operate dependably and adapt quickly to new threats.
Automated Vulnerability Assessment
Progent provides consulting in the application of security evaluation packages such as Microsoft Baseline Security Analyzer and LANguard from GFI for affordably running a variety of automatic system auditing scans to identify possible security weaknesses. Progent has extensive experience with other network auditing tools including NMAP Port Scanner, AMAP, eEye, plus utilities such as Metasploit Framework, Netcat, Socat, and Nikto. Progent can show you how to make sense of audit reports and react appropriately.
Progent can show you how to design security into your business operations, configure scanning software, plan and implement a secure system architecture, and suggest policies to maximize the safety of your IT system. Progent's security professionals are available to show you how to set up a firewall, design secure remote connectivity to email and data, and integrate VPN. Learn more concerning Progent's automated security evaluation.
Security Inventory and Evaluation Bundles for Small Businesses
Progent offers two ultra-affordable security inventory bundles designed to allow small businesses to receive an independent network security evaluation from a certified security expert. With Progent's External Network Security Inventory Checkup, a security engineer administers a comprehensive examination of your IT infrastructure from beyond your company firewall to uncover potential weaknesses in the security posture you expose to the outside world. With Progent's Internal Security Inventory Scan, a security engineer executes a network scan from an authorized machine inside your company firewall to evaluate your exposure to inside attacks. The two security inventory services are set up and run from a secured remote location. The project is overseen by an engineer with high-level security credentials and who generates a report that details and analyzes the data captured by the security scan and suggests practical remediation where appropriate.
Stealth Security Penetration Analysis Support Services
Stealth penetration checking is a key part of any successful IT system security strategy. Progent’s security experts can perform extensive intrusion tests without the awareness of your organization's in-house IT staff. Stealth penetration testing uncovers whether existing security defense tools such as intrusion incident warnings and event log analysis are properly configured and consistently checked. Find out additional information about Progent's network security penetration testing consulting.
Firewalls and VPN Expertise
Progent's background in network security solutions includes extensive field work with leading firewalls and VPN products offered by multiple vendors including Cisco, Microsoft, and CheckPoint. Progent offers the support of engineers who have earned important networking accreditations including Cisco Certified Internetwork Expert and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Integration and Debugging
Progent's Flat-rate Managed Services for Information Security
The latest generation of Cisco ASA 5500-X Family of firewalls with Firepower Services offer significantly more bang for the buck than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX 500 firewalls for new installations. Following Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X devices can be provisioned to enable Firepower Services, built on Sourcefire's Snort product, which is the world's most popular network intrusion protection system (IPS). Firepower services bring enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-qualified CCIE network consultants can assist you to manage your legacy PIX or ASA 5500 firewalls and upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your business to plan, deploy, optimize, administer and troubleshoot firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. See more details about ASA 5500-X Firewalls with Firepower Services integration and debugging services.
Cisco Network Security and Virtual Private Network Engineering Expertise
Cisco's network security and offsite connection technology represent a comprehensive range of easy-to-administer security products to help protect your wired and wireless information system. Cisco's Virtual Private Network line includes routers, firewalls, intrusion detection devices and VPN concentrators. Progent's professional staff of consultants includes experienced specialists with Cisco CCIE and Cisco Certified Network Professional qualifications who can assist your business to select Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that align most closely with your business objectives. Find out additional details about Progent's Engineering Expertise for Cisco Security and Virtual Private Network Appliances.
Engineering Services for Other Firewall and VPN Products
Progent offers small and medium size businesses expert consulting for Intrusion Protection products and IPsec VPN products from major firewall and VPN security vendors including WatchGuard, Juniper, and SonicWALL. Progent can show you how to design a detailed security plan and choose the right products from multiple vendors to achieve your security objectives while sticking within your spending restraints.
Progent's value-priced ProSight portfolio of managed services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
Expert Network Security Planning
ProSight Active Security Monitoring is an endpoint protection (EPP) service that incorporates cutting edge behavior-based analysis technology to defend endpoint devices and physical and virtual servers against new malware attacks such as ransomware and email phishing, which easily evade legacy signature-based AV tools. ProSight Active Security Monitoring protects on-premises and cloud resources and offers a single platform to address the complete malware attack lifecycle including protection, detection, containment, cleanup, and post-attack forensics. Top capabilities include single-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection services offer ultra-affordable in-depth protection for physical servers and virtual machines, workstations, mobile devices, and Exchange email. ProSight ESP uses adaptive security and advanced heuristics for round-the-clock monitoring and reacting to security threats from all attack vectors. ProSight ESP delivers two-way firewall protection, intrusion alerts, endpoint control, and web filtering via cutting-edge technologies packaged within a single agent accessible from a unified console. Progent's security and virtualization experts can help your business to design and configure a ProSight ESP environment that meets your organization's unique requirements and that allows you demonstrate compliance with government and industry data security standards. Progent will assist you specify and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alarms that call for urgent attention. Progent can also assist your company to set up and verify a backup and disaster recovery solution like ProSight Data Protection Services so you can get back in business rapidly from a potentially disastrous cyber attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Microsoft Exchange filtering.
ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services provide small and mid-sized organizations an affordable and fully managed service for secure backup/disaster recovery (BDR). For a fixed monthly cost, ProSight DPS automates and monitors your backup activities and allows fast restoration of vital files, applications and VMs that have become unavailable or corrupted due to component failures, software glitches, natural disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, applications, system images/, as well as Hyper-V and VMware images/. Important data can be protected on the cloud, to a local device, or to both. Progent's cloud backup consultants can deliver world-class expertise to set up ProSight Data Protection Services to be compliant with government and industry regulatory standards like HIPPA, FIRPA, and PCI and, whenever necessary, can assist you to restore your critical data. Learn more about ProSight DPS Managed Cloud Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the infrastructure of top information security vendors to provide web-based control and comprehensive protection for all your inbound and outbound email. The powerful architecture of Progent's Email Guard integrates cloud-based filtering with an on-premises security gateway device to provide complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The Cloud Protection Layer serves as a preliminary barricade and keeps the vast majority of unwanted email from making it to your network firewall. This reduces your exposure to external attacks and saves network bandwidth and storage. Email Guard's onsite gateway device adds a deeper layer of analysis for inbound email. For outgoing email, the onsite security gateway offers AV and anti-spam filtering, DLP, and email encryption. The on-premises security gateway can also help Exchange Server to track and safeguard internal email traffic that originates and ends inside your corporate firewall. For more details, visit ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and applications hosted in a protected Tier III data center on a high-performance virtual host set up and managed by Progent's IT support professionals. Under the ProSight Virtual Hosting service model, the client owns the data, the OS software, and the applications. Since the system is virtualized, it can be moved immediately to an alternate hosting environment without a lengthy and technically risky reinstallation procedure. With ProSight Virtual Hosting, your business is not tied a single hosting service. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, update, find and safeguard information about your network infrastructure, processes, business apps, and services. You can instantly find passwords or IP addresses and be alerted automatically about upcoming expirations of SSLs or warranties. By updating and managing your IT documentation, you can eliminate up to half of time wasted looking for vital information about your network. ProSight IT Asset Management includes a common location for storing and collaborating on all documents related to managing your business network such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT data. Whether you’re planning improvements, doing regular maintenance, or responding to a crisis, ProSight IT Asset Management delivers the information you need as soon as you need it. Find out more details about ProSight IT Asset Management service.
Any company ought to have a thoroughly considered security strategy that includes both proactive processes and response plans. The proactive strategy is a collection of mechanisms intended to reduce security weaknesses. The post-attack plan assists your network security personnel to assess the damage caused by an attack, repair the damage, record the experience, and get the IT network running as rapidly as feasible.
Progent's certified information security engineers are available to help your company to perform a complete vulnerability assessment and create a computer security strategy to establish security policies and mechanisms to mitigate ongoing attacks and threats.
CISM Qualified Network Security Support Services
The Certified Information Security Manager (CISM) organization describes the basic competencies and international standards of skill that information security professionals are required to master. It provides executive management the confidence that consultants who have qualified for their CISM credential have the experience and capability to deliver efficient security administration and consulting services. Progent can provide the services of CISM certified security professionals to assist companies with:
Learn additional details about Progent's CISM Certified Security Consulting Professionals.
- Network Security Governance
- Vulnerability Management
- Network Security Implementation Management
- Information Security Management
- Recovery Management
CISSP Certified Security Engineering Assistance
CISSP certification recognizes mastery of a worldwide standard for information security. The American National Standards Institute has granted certification accreditation in the area of data protection defined by ISO 17024. Progent offers access to of security consultants who have earned CISSP certification. Progent can give you access to a CISSP-certified consultant to help your company in a broad range of security areas including:
Find out additional information about Progent's CISSP Accredited Cybersecurity Support Professionals.
- Security Management Practices
- Security Architecture and Models
- Access Management Solutions and Methodology
- Applications Development Security
- Secure Operations
- Physical Security
- Data Encryption Mechanisms
- Telecommunications, Network and Internet Security
- Disaster Recovery Planning
CISSP-ISSAP Qualified Secure IT Architecture Engineering Expertise
Progent's CISSP-ISSAP certified IT architecture engineers are experts who have been awarded ISSAP Certification through thorough examination and significant experience with information security architecture. The ISSAP certification indicates proven skill in the most challenging requirements of information system security architecture within the broader scope of IS security knowledge required for CISSP accreditation. Progent's ISSAP-certified security experts can assist your business with all phases of secure network architecture including.
Find out additional information concerning Progent's ISSAP Qualified Secure Network Architecture Engineering Professionals.
- Access Management Mechanisms and Techniques
- Telecom and Network Protection
- Cryptography Options
- Requirements Evaluation and Security Criteria
- Business Continuity Planning and Disaster Recovery Planning
- Site Security
CISA Qualified Security Auditing Consulting Assistance
The Certified Information Systems Auditor (CISA) credential is an important qualification that signifies expertise in network security audit and control. Certified by the American National Standards Institute (ANSI), the CISA accreditation requires that consultants undergo a comprehensive examination given by the ISACA professional association. Progent's CISA-qualified security audit experts are available to assist your business in the areas of:
Get the details about Progent's CISA Qualified Security Auditing Consulting Expertise.
- Information Systems Audit Services
- IT Administration
- Systems and Architecture Planned Useful Life
- Information Technology Support
- Protecting Information Assets
- Business Continuity Preparedness
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to validate an IT professional's skills to plan, implement, and support information system controls to mitigate risk. Progent offers the expertise of a CRISC-certified consultant to help your company to develop and execute a workplace continuity strategy that follows industry best practices identified by CRISC and geared to align with your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC-certified IT risk management specialists offer a range of risk identification services including:
Learn the details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Collect data and study documentation to help identify major vulnerabilities
- Inventory legal, regulatory, and business requirements and organizational standards related to your network to assess their potential impact on your strategic goals
- Identify potential vulnerabilities for your business workflows to help in evaluating your enterprise risk
- Develop a risk awareness program and conduct seminars to ensure your organization appreciate IT risk so they can contribute to your risk management process
- Match identified risk scenarios to your associated operational procedures to help determine risk ownership
- Determine risk appetite with your senior management and major stakeholders to make sure they match
GIAC Certified Security Engineering Services
GIAC was established in 1999 to certify the knowledge of network security professionals. GIAC's goal is to ensure that a certified professional possesses the knowledge appropriate to deliver support in vital categories of network, information, and program security. GIAC accreditations are recognized by businesses and institutions around the world including and the United States NSA. Progent's GIAC-qualified network security audit specialists can help your IT organization with:
Find out more information about Progent's GIAC Information Assurance Support.
- Assessing Perimeters
- Incident Response
- Intrusion Detection
- Web-based Application Security
- SIEM solutions
Contact a Certified Security Engineer
To find out how to access a certified security consultant for online or on-premises help in Vermont, call 1-800-993-9400 or visit Online Computer Help.