Business IT networks in Virginia can depend on quick and economical online help from Progent's qualified network security consultants to fix urgent security problems. Rates are competitive, billing is per minute, engagement is immediate, and support is world class. Progent also provides help for complex engagements that requires the expertise of seasoned security consultants with high-level security certifications.
In case your Virginia network is situated away from larger metropolitan areas like Virginia Beach, Norfolk, Chesapeake, Richmond, or Arlington, the availability of local certified network security experts could be limited when you have an emergency. This can cause a loss of revenue for your business, upset clients, unproductive workers, and distracted management. By contacting Progent's online services, you have access to a certified security engineer ready to provide expertise whenever you require it to keep your computer network on line and recover your information.
Progent can assist you in your efforts to guard your information system with support that can range from security checks to creating a comprehensive security strategy. Progent provides affordable support to help businesses of all sizes to design and maintain protected IT environments based on Microsoft Windows and Cisco products and that may include servers and desktops based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as mobile users with Apple handhelds or Google Android or Windows Phone smart phones and tablets.
Progent can also help you outsource spam blocking and defense against e-mail-based security threats. Email Guard is Progent's email filtering and encryption platform that incorporates the services and infrastructure of top data security vendors to provide web-based management and world-class security for your inbound and outbound email. The hybrid structure of Progent's Email Guard managed service combines cloud-based filtering with an on-premises security gateway device to provide complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. ProSight Email Guard's Cloud Protection Layer acts as a preliminary barricade and blocks most threats from reaching your security perimeter. This decreases your vulnerability to external threats and conserves network bandwidth and storage. ProSight Email Guard's onsite security gateway appliance adds a deeper layer of analysis for incoming email. For outgoing email, the on-premises gateway provides anti-virus and anti-spam filtering, DLP, and email encryption. The on-premises gateway can also help Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends within your security perimeter.
Progent's security consultants are accessible online or on site to provide a range of urgent or longer-term network security services such as:
If your company has an emergency need for computer security support, go to Progent's Emergency Remote Technical Support.
Progent's security experts offer world-class support in key facets of computer security that include auditing, firewall/VPN support, and high-level security consulting.
System Security Evaluation
Progent's certified security engineers can evaluate the effectiveness of your current computer security systems through comprehensive remote automated analysis via sophisticated software tools and tested procedures. Progent's skill in administering this testing saves your company consulting fees and offers an objective picture of system vulnerability. The knowledge your IT organization gains can be used as the basis of a security plan that can allow your network to operate dependably and react quickly to new threats.
Automated Network Security Evaluation
Progent offers expertise in the application of security evaluation packages such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard Network Security Scanner for economically performing a set of programmed network testing scans to uncover possible security gaps. Progent has extensive knowledge of additional network auditing tools such as NMAP, AMAP Application Scanner, eEye Vulnerability Scanner, plus tools like Metasploit, Netcat, Socat, and Nikto. Progent can help you to understand audit reports and react appropriately.
Progent can show you how to build protection into your company processes, configure auditing software, plan and deploy a protected system environment, and suggest policies to optimize the security of your IT system. Progent's security consultants are able to assist you to configure a firewall, implement secure remote access to email and data, and install VPN. Find out more on Progent's network security assessment.
Security Inventory and Evaluation Packages for Small Businesses
Progent offers two ultra-affordable security inventory scanning packages designed to allow small companies to receive an impartial security evaluation from a qualified security expert. With Progent's External Network Security Inventory Checkup, an engineer administers an extensive test of your IT infrastructure from outside your firewalled perimeter to uncover possible weaknesses in the security profile you present to the public. With Progent's Internal Security Inventory Scan, a security expert executes a system scan from an authorized machine within your company firewall to determine vulnerabilities to internal threats. The two security inventory services are configured and executed from a protected remote site. The project is directed by a consultant who has earned high-level security credentials and who generates a report that summarizes and interprets the data captured by the security scan and proposes cost-effective improvements where appropriate.
Network Penetration Testing Support Services
Stealth intrusion testing is a key part of any successful IT system security strategy. Progent’s security experts can run thorough penetration tests without the knowledge of your company's in-house IT resources. Unannounced penetration checking shows whether current security defense systems such as intrusion detection alerts and event history monitoring are properly set up and actively monitored. Learn more concerning Progent's stealth security penetration analysis support services.
Firewalls and VPN Solutions
Progent's background in network security solutions encompasses in-depth familiarity with major firewalls and Virtual Private Network products from multiple vendors including Cisco, Microsoft, and CheckPoint. Progent can provide the support of engineers with key industry accreditations including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Configuration and Troubleshooting
The latest generation of Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide substantially more performance than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX firewalls for new installations. Following Cisco's acquisition of Sourcefire, the whole line of ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort product, which is the market's most popular network intrusion protection system. Firepower services provide powerful new features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can help your company to manage your existing PIX or ASA 5500 security appliances or migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist you to plan, configure, optimize, administer and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Find out more information about ASA Firewalls with Firepower integration and troubleshooting services.
Cisco Network Security and VPN Support Services
Cisco's network security and remote connection products offer a comprehensive range of easy-to-administer security products to help protect your local and remote information system. Cisco's Virtual Private Network product family features routers, firewalls, intrusion detection devices and VPN appliances. Progent's expert consulting staff includes experienced specialists with Cisco CCIE and Cisco Certified Network Professional certifications who can assist your organization to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that align best with your business goals. Read more information concerning Progent's Consulting Services for Cisco Security Technology and Virtual Private Network Products.
Engineering Expertise for Additional Firewall and Virtual Private Network Technology
Progent provides small and mid-size companies professional consulting for Intrusion Protection products and IPsec VPN technology from major firewall and Virtual Private Network security vendors including Check Point Software, Juniper, and Symantec. Progent can show you how to design a detailed security strategy and select appropriate technologies from a variety of suppliers to support your security goals while staying within your spending limits.
Progent's Low-Cost Managed Services for Information Assurance
Progent's value-priced ProSight portfolio of network monitoring and management services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that incorporates cutting edge behavior-based machine learning tools to defend endpoints and physical and virtual servers against modern malware assaults like ransomware and file-less exploits, which easily evade legacy signature-matching AV tools. ProSight Active Security Monitoring protects on-premises and cloud-based resources and offers a unified platform to manage the entire threat lifecycle including protection, identification, containment, remediation, and post-attack forensics. Key features include one-click rollback with Windows VSS and automatic network-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
ProSight Enhanced Security Protection (ESP) managed services deliver affordable in-depth protection for physical servers and virtual machines, workstations, mobile devices, and Exchange Server. ProSight ESP uses adaptive security and advanced machine learning for continuously monitoring and responding to security assaults from all attack vectors. ProSight ESP offers firewall protection, penetration alerts, device control, and web filtering via cutting-edge technologies packaged within a single agent accessible from a unified control. Progent's security and virtualization experts can help your business to plan and implement a ProSight ESP environment that meets your organization's unique needs and that helps you achieve and demonstrate compliance with government and industry data protection standards. Progent will help you specify and configure policies that ProSight ESP will manage, and Progent will monitor your network and respond to alerts that call for immediate attention. Progent's consultants can also help your company to set up and verify a backup and disaster recovery solution such as ProSight Data Protection Services (DPS) so you can recover quickly from a destructive security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Microsoft Exchange filtering.
ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent provide small and mid-sized organizations an affordable and fully managed service for reliable backup/disaster recovery (BDR). For a fixed monthly rate, ProSight Data Protection Services automates and monitors your backup activities and allows fast restoration of vital files, applications and virtual machines that have become lost or damaged due to hardware breakdowns, software glitches, disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you protect, recover and restore files, folders, apps, system images/, as well as Hyper-V and VMware images/. Critical data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's cloud backup consultants can provide world-class expertise to configure ProSight DPS to to comply with government and industry regulatory standards like HIPPA, FIRPA, PCI and Safe Harbor and, when necessary, can help you to recover your business-critical data. Find out more about ProSight DPS Managed Cloud Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that uses the technology of top information security companies to provide centralized management and world-class protection for all your email traffic. The powerful architecture of Progent's Email Guard managed service combines a Cloud Protection Layer with a local security gateway appliance to offer complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based malware. Email Guard's cloud filter acts as a first line of defense and blocks most threats from reaching your security perimeter. This decreases your exposure to external threats and saves system bandwidth and storage space. Email Guard's on-premises gateway device provides a deeper level of analysis for inbound email. For outgoing email, the onsite gateway provides AV and anti-spam filtering, protection against data leaks, and email encryption. The onsite gateway can also help Microsoft Exchange Server to monitor and protect internal email that stays within your security perimeter. For more information, visit Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its critical servers and apps hosted in a protected fault tolerant data center on a fast virtual host set up and maintained by Progent's network support experts. Under Progent's ProSight Virtual Hosting service model, the client retains ownership of the data, the operating system software, and the apps. Because the system is virtualized, it can be ported easily to an alternate hosting environment without requiring a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, you are not locked into one hosting service. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, update, find and protect data about your network infrastructure, processes, business apps, and services. You can quickly locate passwords or IP addresses and be warned about impending expirations of SSL certificates or warranties. By cleaning up and organizing your IT documentation, you can save as much as half of time spent trying to find critical information about your network. ProSight IT Asset Management features a centralized repository for storing and collaborating on all documents required for managing your business network like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers advanced automation for gathering and associating IT data. Whether you’re planning improvements, performing maintenance, or responding to an emergency, ProSight IT Asset Management delivers the information you require the instant you need it. Find out more details about ProSight IT Asset Management service.
Expert Security Consulting
Every company ought to develop a thoroughly thought out security strategy that includes both pre-attack processes and reaction planning. The pre-attack plan is a set of procedures intended to reduce security weaknesses. The reactive plan helps your IT security engineers to assess the impact caused by an attack, repair the damage, record the event, and get business functions running as rapidly as possible.
Progent's certified IS security consultants can to assist your business to run a complete risk assessment and create a network security plan to implement security policies and controls to mitigate future assaults and threats.
CISM Certified System Security Consulting Services
The CISM organization defines the basic competencies and worldwide standards of skill that information security professionals are expected to master. CISM provides business management the confidence that consultants who have qualified for their CISM credential have the experience and capability to provide efficient security management and support consulting. Progent offers the support of CISM qualified security professionals to help companies with:
Read more information concerning Progent's CISM Accredited Network Security Support Expertise.
- Information Security Strategies
- Risk Analysis
- Network Security Implementation Management
- Network Security Management
- Recovery Planning
CISSP Accredited Security Consulting Support
CISSP certification denotes expertise with an international standard for data security. ANSI (American National Standards Institute) has awarded certification accreditation in the field of data security stipulated by ISO/IEC 17024. Progent offers the services of security experts who have qualified for CISSP certification. Progent can provide a CISSP-certified consultant to help your enterprise in a variety security areas including:
Find out more details concerning Progent's CISSP Security Consulting Professionals.
- Security Management Procedures
- Security Infrastructure and Models
- Access Control Solutions and Methodology
- Applications Development Security
- Operations Security
- Physical Security
- Data Encryption Technology
- Telecom, Network and WAN Security
- Disaster Recovery Preparedness
CISSP-ISSAP Qualified Secure Network Architecture Engineering Services
Progent's CISSP-ISSAP qualified IT architecture professionals are experts who have been awarded ISSAP status through rigorous testing and extensive work with network security architecture. The Information System Security Architecture Professional (ISSAP) certification indicates proven competence in the most complex requirements of IS security architecture bounded by the broader scope of information system security expertise needed for CISSP certification. Progent's ISSAP-qualified security consultants can assist your company with all phases of architecture security such as.
Find out more information about Progent's ISSAP Qualified Secure Network Architecture Engineering Services.
- Access Management Systems and Methodologies
- Telecommunications and System Infrastructure Protection
- Cryptography Solutions
- Needs Evaluation and Security Standards
- Business Continuity Planning (BCP) and Disaster Recovery Planning
- Site Security
CISA Qualified Information System Security Auditing Engineering Expertise
The Certified Information Systems Auditor (CISA) credential is a recognized qualification that indicates mastery in network security audit and control. Accredited by the American National Standards Institute, the CISA accreditation requires that consultants pass a comprehensive test administered by the ISACA professional group. Progent's CISA network security audit experts can help your IT organization with:
Find out more information concerning Progent's CISA Qualified Security Auditing Engineering Assistance.
- Information Systems Audit Process
- IT Enforcement
- Network Assets and Architecture Lifecycle Planning
- IT Service Delivery
- Protecting Information Assets
- Business Continuity Planning
Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC program was initiated by ISACA in 2010 to validate a consultant's ability to design, implement, and support IS controls to mitigate network risk. Progent can provide the expertise of a CRISC-certified engineer to assist your company to develop and carry out a business continuity or disaster recovery strategy that follows leading practices promoted by CRISC and crafted to align with your organization's risk tolerance, business objectives, and IT budget. Progent's CRISC network risk management specialists can provide a variety of risk evaluation services including:
Get the details concerning Progent's CRISC Risk Management Consultants.
- Gather information and study documentation to help identify significant vulnerabilities
- Inventory statutory, industry, and contractual requirements and company standards associated with your information system to assess their potential impact on your strategic objectives
- Identify possible vulnerabilities for your business workflows to assist in analyzing your enterprise risk
- Create a risk awareness initiative and provide seminars to make sure your organization understand IT risk so they can assist with your risk management program
- Match key risk vectors to related operational procedures to help determine risk responsibility
- Validate risk appetite with executive management and major stakeholders to ensure they match
GIAC Accredited IS Security Engineering Support
Read additional details about Progent's GIAC Information Assurance Services.
Global Information Assurance Certification was founded in 1999 to validate the skill of information technology security engineers. GIAC's goal is to make sure that an accredited professional possesses the skills appropriate to deliver services in important categories of system, information, and software security. GIAC certifications are recognized by companies and government organizations all over the world including and the United States NSA. Progent's GIAC-qualified network security audit engineers are available to assist your company in the areas of:
Talk to a Security Specialist
To find out how you can contact a certified security consultant for online or onsite help in Virginia, call 1-800-993-9400 or go to Online Computer Help.