Company computer networks in Virginia can have quick and affordable online access to Progent's accredited network security experts to help with urgent security issues. The cost is competitive, billing is by the minute, engagement is fast, and support is unbeatable. Progent also provides help for complex projects that demand the knowledge of senior security consultants with top security certifications.
If your Virginia company is some distance from larger metropolitan areas such as Virginia Beach, Norfolk, Chesapeake, Richmond, or Arlington, access to nearby accredited security engineers is often limited when you have a crisis. This could mean a drop in productivity for your company, upset clients, unproductive employees, and defocused management. By calling Progent, you have access to a certified security professional who can provide expertise when you have to have it to get your information system running and salvage your data.
Progent can help you in your efforts to protect your network with services that can range from network security assessments to creating a company-wide security plan. Progent provides affordable service to help companies of any size to configure and manage safe networks based on Windows and Cisco technology and that can include servers and desktops based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as BYOD clients with Apple iPhones and iPads or Google Android or Windows Phone smart phones and tablets.
Progent can also assist you to outsource spam blocking and defense against email-borne assaults. Email Guard is Progent's email filtering and encryption solution that incorporates the services and infrastructure of leading data security vendors to provide centralized management and comprehensive security for all your email traffic. The powerful structure of Email Guard integrates cloud-based filtering with a local security gateway device to offer complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based malware. ProSight Email Guard's cloud filter serves as a preliminary barricade and keeps most threats from making it to your security perimeter. This reduces your exposure to external attacks and conserves network bandwidth and storage. ProSight Email Guard's onsite gateway appliance adds a further level of analysis for incoming email. For outgoing email, the on-premises gateway provides anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The local security gateway can also enable Exchange Server to track and protect internal email that originates and ends inside your corporate firewall.
Progent's security consultants are accessible remotely or on premises to provide a range of emergency or project-based IT security services such as:
If your network has an urgent requirement for computer security support, refer to Progent's Urgent Remote Technical Support.
Progent's consultants can deliver advanced support in key facets of network protection that include security assessment, firewalls and VPN, and high-level security planning.
Progent's certified security engineers can evaluate the effectiveness of your current network security environment through exhaustive remote automated analysis based on advanced utilities and tested techniques. Progent's experience in administering this testing saves you consulting fees and assures an objective picture of gaps. The information your business gains can form the basis of a network protection plan that can allow your information system to run safely and react rapidly to future risks.
Automated Network Security Assessment
Progent offers expertise in the use of security analysis software such as Microsoft's MBSA and GFI LANguard NSS for economically running a variety of automatic system auditing scans to identify possible security problems. Progent has broad knowledge of additional security auditing tools such as NMAP, AMAP Application Scanner, eEye Vulnerability Scanner, plus utilities like SolarWinds, Netcat, Socat, and Nikto. Progent can show you how to make sense of audit reports and respond appropriately.
Progent can show you how to build protection into your company operations, configure scanning software, plan and implement a secure network architecture, and suggest policies to maximize the security of your network. Progent's security professionals are able to show you how to set up a firewall, design safe remote connectivity to email and business applications, and integrate VPN. Find out more about Progent's automated security audits.
Security Inventory and Evaluation Bundles for Small Businesses
Progent has put together two ultra-affordable security inventory service bundles designed to enable small businesses to receive a professional security assessment from a qualified security specialist. With Progent's External Security Inventory Checkup, a security engineer administers an extensive examination of your network from outside your firewalled perimeter to determine possible weaknesses in the security posture you expose to the public. With Progent's Internal Security Inventory Checkup, an engineer executes a network scan from a secure machine within your company firewall to assess your exposure to internal attacks. The two security inventory services are set up and run from a protected remote location. The process is overseen by an engineer with top security credentials and who generates a document that details and interprets the information captured by the scan and suggests cost-effective remediation if appropriate.
Stealth Penetration Testing Support Services
Stealth intrusion checking is a key part of any comprehensive network security plan. Progentís security experts can run extensive penetration tests without the awareness of your organization's internal network support staff. Stealth penetration testing shows whether current security monitoring tools such as intrusion incident warnings and event log analysis are correctly set up and actively checked. Find out more on Progent's network penetration testing support services.
Firewall and Virtual Private Network Support
Progent's background in network security solutions encompasses extensive field work with leading firewalls and VPN technology offered by a variety of companies including Cisco, Microsoft, and Juniper. Progent offers the support of engineers who have earned key industry certifications including CCIE and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Integration and Debugging
The latest generation of ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver significantly more bang for the buck than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX firewalls for all new deployments. After Cisco's purchase of Sourcefire, the whole family of ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort product, which is the market's most popular intrusion protection system. Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can help you to manage your current PIX or ASA 5500 firewalls and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your organization to design, integrate, tune, administer and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Read additional information about Cisco ASA 5500-X Firewalls with Firepower integration and debugging support.
Cisco Security and VPN Consulting Services
Cisco's network security and offsite connection technology provide a complete range of easy-to-administer security solutions to help safeguard your wired and wireless information system. Cisco's VPN product family includes switches, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's expert staff of consultants includes experienced engineers with Cisco Certified Internetwork Expert and CCNP certifications who can help your business to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that fit most closely with your company objectives. Learn additional details about Progent's Support Expertise for Cisco Security and Virtual Private Network Products.
Engineering Expertise for Other Firewall and VPN Technology
Progent offers small and mid-size organizations expert consulting for Intrusion Protection products and IPsec VPN solutions from leading firewall and VPN security companies such as Check Point Software, Juniper Networks, and Symantec. Progent can help you create a comprehensive security plan and choose appropriate products from multiple vendors to support your security goals while staying within your spending limits.
Progent's Flat-rate Managed Services for Information Security
Progent's value-priced ProSight portfolio of network monitoring and management services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection (EPP) service that utilizes cutting edge behavior-based analysis tools to guard endpoint devices and physical and virtual servers against new malware assaults such as ransomware and file-less exploits, which routinely escape traditional signature-matching AV products. ProSight Active Security Monitoring safeguards local and cloud resources and provides a single platform to automate the complete malware attack lifecycle including filtering, infiltration detection, mitigation, remediation, and forensics. Key capabilities include single-click rollback with Windows VSS and real-time network-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) managed services offer ultra-affordable multi-layer protection for physical and virtual servers, workstations, smartphones, and Exchange Server. ProSight ESP uses adaptive security and advanced heuristics for round-the-clock monitoring and reacting to cyber assaults from all vectors. ProSight ESP delivers two-way firewall protection, penetration alerts, endpoint control, and web filtering via cutting-edge tools incorporated within a single agent accessible from a single control. Progent's security and virtualization experts can assist you to design and implement a ProSight ESP deployment that meets your company's specific needs and that allows you achieve and demonstrate compliance with government and industry data security regulations. Progent will help you specify and configure security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alarms that require immediate action. Progent can also help you to install and verify a backup and restore system like ProSight Data Protection Services so you can recover quickly from a destructive security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Exchange email filtering.
ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services offer small and mid-sized organizations a low cost end-to-end solution for secure backup/disaster recovery (BDR). For a fixed monthly rate, ProSight Data Protection Services automates your backup activities and allows rapid recovery of vital files, applications and virtual machines that have become unavailable or damaged due to hardware failures, software bugs, natural disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, apps, system images/, plus Hyper-V and VMware images/. Important data can be protected on the cloud, to a local device, or to both. Progent's backup and recovery specialists can deliver world-class expertise to configure ProSight DPS to be compliant with government and industry regulatory requirements such as HIPPA, FIRPA, PCI and Safe Harbor and, when needed, can help you to restore your critical information. Read more about ProSight Data Protection Services Managed Cloud Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that uses the technology of leading information security companies to deliver centralized control and comprehensive protection for your inbound and outbound email. The hybrid architecture of Email Guard managed service combines cloud-based filtering with an on-premises security gateway appliance to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne malware. The Cloud Protection Layer acts as a preliminary barricade and keeps most unwanted email from making it to your security perimeter. This reduces your exposure to inbound threats and conserves network bandwidth and storage space. Email Guard's on-premises security gateway appliance adds a deeper layer of analysis for inbound email. For outbound email, the on-premises gateway offers anti-virus and anti-spam protection, protection against data leaks, and email encryption. The onsite security gateway can also assist Exchange Server to track and protect internal email traffic that originates and ends inside your corporate firewall. For more details, see ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its key servers and applications hosted in a protected fault tolerant data center on a fast virtual machine host set up and managed by Progent's network support professionals. With the ProSight Virtual Hosting model, the client owns the data, the operating system platforms, and the apps. Because the environment is virtualized, it can be ported immediately to an alternate hardware solution without requiring a lengthy and difficult configuration procedure. With ProSight Virtual Hosting, your business is not tied one hosting provider. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, update, retrieve and protect data about your IT infrastructure, procedures, applications, and services. You can quickly find passwords or serial numbers and be alerted about impending expirations of SSLs or warranties. By updating and organizing your IT infrastructure documentation, you can save as much as half of time wasted looking for critical information about your IT network. ProSight IT Asset Management features a centralized repository for storing and collaborating on all documents required for managing your network infrastructure like recommended procedures and How-To's. ProSight IT Asset Management also supports advanced automation for gathering and relating IT information. Whether youíre planning improvements, performing regular maintenance, or responding to a crisis, ProSight IT Asset Management gets you the data you need the instant you need it. Find out more details about Progent's ProSight IT Asset Management service.
Certified Security Consulting
Any business ought to develop a thoroughly considered security program that incorporates both proactive processes and reaction plans. The proactive plan is a collection of procedures intended to minimize vulnerabilities. The reactive strategy helps your network security engineers to evaluate the impact caused by a security penetration, repair the network, document the event, and get the IT network running as quickly as feasible.
Progent's expert IS security engineers are available to help you to run a complete vulnerability assessment and create a company-wide security plan to implement security policies and controls to minimize future attacks and dangers.
CISM Accredited Security Consulting Expertise
The Certified Information Security Manager (CISM) committee describes the core capabilities and international standards of skill that IT security professionals are expected to learn. CISM provides executive management the confidence that consultants who have qualified for their CISM credential possess the experience and knowledge to deliver efficient security management and consulting services. Progent can provide the expertise of CISM qualified security professionals to help companies with:
Read additional information about Progent's CISM IS Security Engineering Professionals.
- Network Security Processes
- Risk Analysis
- IS Security Program Management
- IS Security Administration
- Recovery Planning
CISSP Certified Security Engineering Assistance
CISSP certification recognizes mastery of a global standard for network security. The American National Standards Institute has granted certification recognition in the area of information security defined by ISO 17024. Progent can provide access to of security consultants who have qualified for CISSP accreditation. Progent can provide a CISSP-certified professional to help your enterprise in a broad range of security fields such as:
Read additional details concerning Progent's CISSP Qualified Security Consulting Services.
- Security Management Practices
- Security Architecture and Models
- Access Management Solutions and Processes
- Applications Development Security
- Secure Operations
- Physical Security
- Data Encryption Technology
- Telecommunications, LAN and WAN Security
- Business Continuity Planning
CISSP-ISSAP Qualified Secure System Architecture Engineering Support
Progent's CISSP-ISSAP qualified IT architecture professionals are experts who have earned ISSAP Certification as a result of rigorous testing and extensive experience with information security architecture. The Information System Security Architecture Professional (ISSAP) certification represents demonstrated competence in the most challenging demands of IS security architecture bounded by the wider field of information system security expertise needed for CISSP accreditation. Progent's ISSAP-certified security experts can help your business with all phases of secure network architecture such as.
Learn more details concerning Progent's ISSAP Certified Secure IT Architecture Engineering Expertise.
- Access Management Systems and Techniques
- Phone System and System Infrastructure Protection
- Encryption/Decryption Solutions
- Needs Analysis and Security Standards
- BCP and Disaster Recovery Planning (DRP)
- Hardware Security
CISA Accredited Security Auditing Engineering Support
The Certified Information Systems Auditor (CISA) credential is a prestigious achievement that represents mastery in IS security audit and control. Certified by ANSI, the CISA accreditation has consultants undergo a comprehensive test given by the ISACA professional association. Progent's CISA-certified network security audit specialists can assist your company with:
Read the details concerning Progent's CISA Qualified Network Security Auditing Engineering Services.
- IS Audit Services
- Information Technology Administration
- Network Assets and Infrastructure Planned Useful Life
- IT Service Delivery
- Protecting Information Resources
- Disaster Recovery Preparedness
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA in 2010 to validate an IT professional's skills to plan, deploy, and maintain IS control mechanisms to mitigate network risk. Progent offers the expertise of a CRISC-certified engineer to assist you to create and execute a business continuity or disaster recovery strategy that follows industry best practices identified by CRISC and geared to match your organization's risk appetite, business goals, and IT budget. Progent's CRISC-certified IT risk mitigation experts offer a variety of risk evaluation services including:
Find out the details concerning Progent's CRISC Risk Management Experts.
- Gather data and review documentation to evaluate major risk scenarios
- Inventory legal, regulatory, and business mandates and organizational standards related to your network to assess their possible impact on your strategic objectives
- Point out possible vulnerabilities for your operational workflows to assist in evaluating your corporate risk
- Create a risk awareness program and provide training to ensure your organization understand IS risk so they can assist with your risk management program
- Connect key risk vectors to related operational procedures to help determine risk responsibility
- Validate risk appetite with executive management and major stakeholders to make sure they align
GIAC Certified IS Security Engineering Support
Global Information Assurance Certification was established in 1999 to validate the skill of computer security professionals. GIAC's goal is to assure that a certified professional has the skills necessary to provide support in key categories of system, information, and application program security. GIAC accreditations are acknowledged by businesses and government organizations throughout the world including and the United States NSA. Progent's GIAC security audit engineers can assist your company in the areas of:
Read more details about Progent's GIAC Information Assurance Services.
- Assessing Networks
- Incident Handling
- Intrusion Detection
- Web Application Security
- SIEM solutions
Get in Touch with a Certified Progent Security Engineer
To learn how you can access a security consultant for remote or onsite expertise in Virginia, call 1-800-993-9400 or go to Remote Computer Help.
© 2002-2019 Progent Corporation. All rights reserved.