Small business information networks in Vermont can have prompt and economical online access to Progent's qualified network security engineers to assist with critical security issues. Rates are competitive, charges are per minute, sign-up is quick, and service is unbeatable. Progent also offers help for complex projects that demand the knowledge of senior security consultants with high-level security certifications.
In case your Vermont small business is located outside of more populated urban areas including Burlington, Rutland, or Montpelier, contact with nearby accredited network security support specialists could be problematic during an urgent situation. This can cause lost revenue for your business, upset clients, idle employees, and distracted management. By utilizing Progent's remote support, you have access to a qualified security engineer ready to provide expertise whenever you require it to get your information system operating and restore your data.
Progent can assist you in a variety of ways in your initiatives to protect your IT environment with support ranging from security assessments to creating a company-wide security plan. Progent offers affordable service to assist small and midsize companies to set up and manage protected IT environments based on Microsoft Windows and Cisco products and that may include servers and desktops running UNIX, Linux, Solaris, or Apple Mac OS X operating systems as well as BYOD clients with Apple handhelds or Google Android or Windows Phone devices.
Progent can also help you outsource spam filtering and defense against email-borne attacks. Email Guard is Progent's email filtering and encryption solution that incorporates the technology of leading data security vendors to deliver centralized management and comprehensive protection for all your email traffic. The hybrid architecture of Email Guard combines a Cloud Protection Layer with an on-premises security gateway appliance to provide complete protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne malware. ProSight Email Guard's Cloud Protection Layer acts as a preliminary barricade and keeps the vast majority of threats from making it to your network firewall. This decreases your exposure to external attacks and conserves network bandwidth and storage space. ProSight Email Guard's on-premises security gateway appliance adds a deeper layer of analysis for incoming email. For outgoing email, the onsite security gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The local gateway can also help Microsoft Exchange Server to monitor and safeguard internal email that stays within your corporate firewall.
Progent's security professionals are accessible remotely or in person to offer a range of emergency or longer-term computer security services which include:
If your business has an emergency need for IT security support, refer to Progent's Urgent Online Technical Help.
Progent's consultants can deliver advanced services in vital areas of system security that include security evaluation, firewalls and VPN, and high-level security consulting.
System Security Audits
Progent's certified security consultants can evaluate the vulnerability of your existing computer security environment by performing comprehensive remote automated analysis based on advanced utilities and proven procedures. Progent's experience in this testing saves your company time and money and offers an objective picture of system vulnerability. The information your business is provided can be used as the basis of a network protection strategy that will allow your network to run dependably and react quickly to new threats.
Automated Network Security Analysis
Progent provides consulting in the application of security auditing products including Microsoft Baseline Security Analyzer and GFI LANguard Network Security Scanner for affordably running a set of programmed system testing checks to identify possible security gaps. Progent has extensive experience with other network analysis products such as NMAP, AMAP Application Scanner, eEye Vulnerability Scanner, plus utilities like Metasploit, Netcat, and Nikto. Progent can help you to make sense of audit reports and respond appropriately.
Progent can show you how to design protection into your company processes, configure auditing software, plan and deploy a secure network environment, and recommend policies to optimize the security of your network. Progent's security consultants are able to show you how to set up a firewall, implement safe remote connectivity to email and data, and integrate VPN. Learn more concerning Progent's automated security evaluation.
Security Inventory Packages for Small Companies
Progent offers two ultra-affordable security inventory scanning packages intended to allow small companies to get an independent network security assessment from a qualified security engineer. With Progent's External Network Security Inventory Scan, a security engineer administers a comprehensive test of your network from beyond your firewall to uncover possible risks in the security posture you present to the outside world. With Progent's Internal Security Inventory Scan, an engineer runs a system scan from an authorized machine within your company firewall to uncover the risk to internal assaults. The two security inventory packages are configured and run from a secured external location. The process is overseen by an engineer with top security credentials and who produces a document that summarizes and analyzes the information collected by the security scan and suggests cost-effective improvements if appropriate.
Stealth Intrusion Analysis Consulting
Stealth intrusion testing is an important part of any successful IT system security strategy. Progentís security professionals can perform extensive intrusion checks without the awareness of your company's in-house IT resources. Stealth penetration testing uncovers whether current security defense tools such as intrusion detection alerts and event history monitoring are properly configured and consistently monitored. Find out additional information about Progent's network security penetration analysis consulting.
Firewall And Virtual Private Network (VPN) Expertise
Progent's expertise in network security solutions encompasses in-depth field work with leading firewalls and Virtual Private Network technology offered by a variety of companies such as Cisco, Microsoft, and Symantec. Progent offers the support of engineers who have earned important industry certifications such as Cisco Certified Internetwork Expert and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Troubleshooting
The new Cisco ASA 5500-X Family of firewalls with Firepower Services offer substantially more performance than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX security appliances for all new deployments. Since Cisco's purchase of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be configured to enable Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed intrusion protection system. Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist your company to manage your legacy PIX or ASA 5500 firewalls or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your company to design, configure, optimize, administer and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. See more details about ASA 5500-X Firewalls with Firepower integration and troubleshooting services.
Cisco Network Security and Virtual Private Network Support Expertise
Cisco's security and offsite access products represent a comprehensive line of manageable security solutions to help safeguard your wired and wireless information system. Cisco's VPN product family features routers, firewalls, intrusion detection devices and VPN concentrators. Progent's expert consulting staff includes field-proven specialists with Cisco's CCIE and CCNP certifications who can help your business to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that align best with your company objectives. Learn more information about Progent's Consulting Expertise for Cisco Security Solutions and Virtual Private Network Appliances.
Engineering Expertise for Additional Firewall and VPN Technology
Progent provides small and medium size businesses expert support for Intrusion Protection products and IPsec VPN products from major firewall and Virtual Private Network security companies such as Check Point Software, Juniper Networks, and SonicWALL. Progent can show you how to design a comprehensive security plan and choose appropriate technologies from a variety of suppliers to achieve your security goals while staying within your spending restraints.
Progent's Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight line of outsourced network management services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates cutting edge behavior-based analysis technology to defend endpoint devices as well as physical and virtual servers against modern malware attacks like ransomware and email phishing, which routinely get by traditional signature-matching anti-virus products. ProSight Active Security Monitoring protects local and cloud resources and offers a unified platform to automate the complete malware attack lifecycle including protection, detection, containment, cleanup, and post-attack forensics. Top features include one-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection (ESP) managed services offer economical in-depth security for physical servers and virtual machines, workstations, mobile devices, and Exchange email. ProSight ESP uses contextual security and advanced machine learning for continuously monitoring and responding to cyber threats from all attack vectors. ProSight ESP delivers firewall protection, intrusion alarms, endpoint control, and web filtering via leading-edge tools incorporated within a single agent managed from a unified control. Progent's security and virtualization consultants can assist your business to plan and implement a ProSight ESP deployment that meets your organization's unique needs and that allows you demonstrate compliance with government and industry data security standards. Progent will assist you define and configure security policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alarms that call for urgent attention. Progent can also help you to set up and test a backup and disaster recovery system like ProSight Data Protection Services so you can recover rapidly from a potentially disastrous security attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Microsoft Exchange filtering.
ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services from Progent offer small and mid-sized organizations an affordable and fully managed service for secure backup/disaster recovery. For a fixed monthly cost, ProSight DPS automates your backup activities and enables fast restoration of critical data, apps and virtual machines that have become lost or corrupted due to hardware failures, software glitches, disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you protect, recover and restore files, folders, applications, system images/, plus Hyper-V and VMware images/. Critical data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's BDR specialists can provide advanced support to configure ProSight DPS to be compliant with government and industry regulatory standards like HIPPA, FINRA, PCI and Safe Harbor and, when needed, can assist you to recover your business-critical information. Learn more about ProSight Data Protection Services Managed Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering service that uses the infrastructure of top information security vendors to provide web-based control and world-class protection for all your email traffic. The hybrid structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local gateway appliance to provide advanced protection against spam, viruses, Dos Attacks, DHAs, and other email-borne malware. The cloud filter acts as a preliminary barricade and keeps most unwanted email from reaching your security perimeter. This decreases your exposure to external attacks and saves system bandwidth and storage space. Email Guard's onsite security gateway device provides a deeper layer of inspection for inbound email. For outbound email, the onsite security gateway offers anti-virus and anti-spam filtering, DLP, and email encryption. The local security gateway can also help Exchange Server to monitor and protect internal email traffic that stays inside your security perimeter. For more details, visit Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its key servers and apps hosted in a protected fault tolerant data center on a high-performance virtual machine host set up and maintained by Progent's IT support professionals. Under Progent's ProSight Virtual Hosting model, the client retains ownership of the data, the OS platforms, and the apps. Because the system is virtualized, it can be moved easily to a different hardware solution without requiring a time-consuming and difficult configuration process. With ProSight Virtual Hosting, you are not tied one hosting service. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, find and protect data about your network infrastructure, procedures, business apps, and services. You can instantly find passwords or serial numbers and be warned about impending expirations of SSLs or domains. By updating and organizing your IT infrastructure documentation, you can save up to half of time wasted looking for vital information about your IT network. ProSight IT Asset Management features a centralized repository for storing and collaborating on all documents required for managing your business network like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers advanced automation for collecting and associating IT information. Whether youíre making improvements, performing maintenance, or responding to an emergency, ProSight IT Asset Management delivers the information you need when you need it. Learn more details about ProSight IT Asset Management service.
Certified Security Planning
Every company ought to have a carefully thought out security strategy that incorporates both preventive procedures and response planning. The pre-attack plan is a collection of mechanisms designed to reduce vulnerabilities. The reactive plan helps your network security personnel to assess the impact resulting from a security penetration, repair the system, record the experience, and get the IT network restored as rapidly as feasible.
Progent's certified IS security consultants are available to assist your business to run a complete risk assessment and create a company-wide security plan to establish security policies and controls to mitigate future attacks and threats.
CISM Accredited Network Security Engineering Services
The CISM committee describes the core capabilities and worldwide standards of performance that IT security professionals are required to learn. CISM provides business management the confidence that those who have earned their CISM credential have the experience and capability to provide effective security management and support services. Progent can provide the expertise of CISM certified security consultants to assist companies with:
Learn more information concerning Progent's CISM Accredited Network Security Engineering Professionals.
- IS Security Governance
- Risk Analysis
- Network Security Implementation Management
- IS Security Administration
- Recovery Management
CISSP Accredited Security Engineering Services
The CISSP credential recognizes mastery of a global standard for data security. ANSI has granted certification accreditation in the field of information protection under ISO 17024. Progent offers access to of security experts who have qualified for CISSP accreditation. Progent can provide a CISSP-certified expert to help your business in a variety security areas such as:
Learn additional information about Progent's CISSP-certified Cybersecurity Consulting Professionals.
- Security Management Practices
- Security Infrastructure and Paradigms
- Access Management Solutions and Processes
- Applications Development Security
- Secure Operations
- Site Security
- Data Encryption Mechanisms
- Telecommunications, Network and Internet Security
- Disaster Recovery Planning
CISSP-ISSAP Qualified Secure System Architecture Consulting Assistance
Progent's CISSP-ISSAP qualified information system architecture engineers are experts who have been awarded ISSAP status as a result of thorough testing and significant work with information security architecture. The Information System Security Architecture Professional (ISSAP) certification represents demonstrated competence in the more challenging demands of information security architecture within the wider field of IS security knowledge needed for CISSP accreditation. Progent's ISSAP-qualified security consultants can assist your company with all phases of secure network architecture including.
Find out additional information concerning Progent's ISSAP Qualified Secure Information System Architecture Engineering Services.
- Access Control Mechanisms and Techniques
- Phone System and System Infrastructure Security
- Encryption/Decryption Options
- Needs Analysis and Security Guidelines
- BCP and DRP
- Hardware Security
CISA Certified Security Auditing Engineering Expertise
The CISA credential is a recognized achievement that represents mastery in IS security audit and control. Certified by the American National Standards Institute, the CISA accreditation requires that consultants pass an extensive examination administered by the ISACA international professional group. Progent's CISA-certified IS security audit experts are available to assist your IT organization in the areas of:
Find out the details about Progent's CISA Qualified Network Security Auditing Engineering Support.
- Information Systems Audit Services
- IT Enforcement
- Network Assets and Infrastructure Lifecycle
- Information Technology Service Delivery
- Protecting Information Resources
- Disaster Recovery Planning
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA to verify an IT professional's skills to plan, implement, and support IS controls to reduce network risk. Progent offers the services of a CRISC-certified consultant to help you to develop and execute a business continuity plan based on leading practices promoted by CRISC and crafted to match your company's risk appetite, business goals, and budgetary guidelines. Progent's CRISC-qualified IT risk management experts offer a variety of risk identification services such as:
Read the details about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Gather data and review documentation to identify significant risk scenarios
- Identify legal, regulatory, and contractual mandates and company policies associated with your network to assess their potential impact on your business goals
- Point out possible vulnerabilities for your business processes to help in evaluating your corporate risk
- Create a risk awareness program and conduct seminars to ensure your stakeholders appreciate IS risk so they can contribute to your risk management process
- Match key risk vectors to your associated operational processes to help assign risk ownership
- Validate risk appetite with your senior management and key stakeholders to ensure they match
GIAC Accredited Security Consulting Assistance
Global Information Assurance Certification was founded in 1999 to certify the knowledge of IT security experts. GIAC's goal is to assure that a certified professional has the skills appropriate to deliver services in vital areas of system, data, and program security. GIAC accreditations are recognized by companies and institutions throughout the world including and the U.S. National Security Agency (NSA). Progent's GIAC-certified IS security audit engineers are available to help your business in the areas of:
Read additional details about Progent's GIAC Information Assurance Expertise.
- Auditing Perimeters
- Incident Response
- Intrusion Detection
- Web Application Security
- SIEM solutions
Contact a Certified Progent Security Specialist
To find out how you can contact a Progent security engineer for remote or onsite expertise in Vermont, call 1-800-993-9400 or go to Remote Network Support.
© 2002-2019 Progent Corporation. All rights reserved.