Business computer networks in the state of West Virginia can have prompt and economical online technical support from Progent's qualified network security experts to assist with urgent security problems. Rates are competitive, billing is per minute, sign-up is fast, and service is unbeatable. Progent also offers assistance for complex engagements that demand the services of seasoned security consultants with high-level industry certifications.
If your West Virginia network is situated outside of major metropolitan neighborhoods such as Charleston, Huntington, Morgantown, or Parkersburg, support from local qualified network security engineers is often problematic when you have an urgent situation. This can cause lost income for your business, upset clients, idle workers, and defocused management. By utilizing Progent's remote support, you have access to a qualified security professional who can offer help whenever you require it to keep your system on line and salvage your data.
Progent can help you in your efforts to protect your IT environment with services ranging from network security audits to creating a company-wide security strategy. Progent offers affordable service to assist small and midsize companies to configure and maintain secure networks powered by Microsoft Windows and Cisco technology and that may include servers and desktops based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as BYOD users with Apple iOS handhelds or Android or Windows Phone devices.
Progent can also show you how to outsource spam filtering and defense against email-borne attacks. Email Guard is Progent's email security solution that incorporates the services and infrastructure of leading information security companies to deliver centralized control and world-class protection for your inbound and outbound email. The powerful architecture of Progent's Email Guard integrates cloud-based filtering with a local security gateway device to provide advanced defense against spam, viruses, Dos Attacks, DHAs, and other email-based threats. The Cloud Protection Layer acts as a first line of defense and keeps the vast majority of threats from making it to your security perimeter. This decreases your vulnerability to external attacks and conserves network bandwidth and storage. ProSight Email Guard's on-premises gateway appliance adds a further layer of analysis for incoming email. For outgoing email, the on-premises security gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also enable Microsoft Exchange Server to track and protect internal email traffic that stays inside your corporate firewall.
Progent's certified consultants are available online or on site to provide a range of emergency or project-based network security services which include:
If your company has an emergency requirement for computer security support, go to Progent's Urgent Online Network Support.
- Run thorough security evaluations
- Recover rapidly after virus and worm attacks
- Set up firewalls from multiple vendors
- Configure secure methods for offsite and mobile connectivity
- Install effective solutions for defense against spam and directory harvest attacks
- Develop a company-wide security strategy with 24x7 security monitoring
- Offer comprehensive Call Center Support
- Create a practical data backup and disaster recovery plan built around Data Protection Manager (DPM) backup capability
Progent's engineers offer advanced support in vital facets of computer protection including security assessment, firewall/VPN support, and advanced security consulting.
System Security Audits
Progent's certified security consultants can assess the effectiveness of your existing computer security systems by performing comprehensive remote automated analysis via sophisticated software tools and tested techniques. Progent's experience in this service saves your company money and offers a detailed portrayal of weaknesses. The information your IT organization gains can be used as the foundation of a network protection plan that will allow your information system to operate safely and react rapidly to future risks.
Automated Network Security Evaluation
Progent provides expertise in the application of security analysis software such as Microsoft's MBSA and GFI LANguard NSS for affordably performing a variety of automatic network auditing scans to uncover possible security vulnerabilities. Progent has extensive experience with additional network auditing tools such as NMAP, AMAP Application Scanner, eEye Vulnerability Scanner, as well as tools such as SolarWinds, Netcat, Hydra, and Nikto. Progent can show you how to make sense of audit reports and respond effectively.
Progent can help you design protection into your business processes, install scanning applications, plan and implement a secure system architecture, and recommend policies to optimize the safety of your IT system. Progent's security professionals are able to help you set up a firewall, design secure remote access to email and data, and install virtual private network. Find out more on Progent's network security evaluation.
Security Inventory Bundles for Small Companies
Progent has put together two ultra-affordable security inventory bundles designed to allow small businesses to get an independent security assessment from a qualified security engineer. With Progent's External Security Inventory Checkup, an engineer runs a comprehensive test of your network from beyond your firewalled perimeter to determine possible weaknesses in the security posture you expose to the public. With Progent's Internal Security Inventory Checkup, a security expert runs a system scan from an authorized machine within your company firewall to uncover the risk to internal threats. The two security inventory services are set up and run from a protected external location. The project is overseen by a consultant with top security accreditations and who generates a report that summarizes and analyzes the information captured by the security scan and proposes practical remediation where called for.
Network Intrusion Analysis Support Services
Stealth penetration testing is a key component of any successful IT system security strategy. Progent’s security professionals can perform thorough intrusion checks without the knowledge of your organization's in-house IT staff. Unannounced penetration testing shows whether existing security monitoring systems such as intrusion detection alerts and event log monitoring are properly set up and actively monitored. Find out more about Progent's stealth penetration testing support services.
Firewall and Virtual Private Network Solutions
Progent's background in network security solutions includes in-depth field work with leading firewalls and VPN technology offered by a variety of companies such as Cisco, Microsoft, and Juniper. Progent offers the support of consultants with key industry accreditations including CCIE and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Integration and Debugging
The new ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide significantly more value than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new deployments. Since Cisco's acquisition of Sourcefire, the whole line of ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system. Firepower services bring enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help your company to manage your legacy PIX or ASA 5500 firewalls or migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your company to plan, deploy, optimize, manage and debug firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. See additional details about ASA Firewalls with Firepower configuration and debugging services.
Cisco Network Security and Virtual Private Network Engineering Services
Cisco's security and remote access products provide a comprehensive line of manageable security solutions to help safeguard your local and remote network infrastructure. Cisco's VPN product family includes routers, firewalls, intrusion detection systems and VPN appliances. Progent's professional consulting staff includes experienced engineers with Cisco CCIE and Cisco Certified Network Professional certifications who can help your company to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that align best with your business goals. Learn more details concerning Progent's Support Expertise for Cisco Security Solutions and Virtual Private Network Appliances.
Engineering Expertise for Other Firewall and Virtual Private Network Products
Progent offers small and mid-size businesses professional consulting for Intrusion Protection Systems and IPsec VPN products from leading firewall and Virtual Private Network security vendors including WatchGuard, Juniper, and Symantec. Progent can show you how to design a comprehensive security strategy and select the right technologies from a variety of suppliers to support your security goals while sticking within your spending limits.
Progent's Fixed-price Managed Services for Information Security
Progent's low-cost ProSight line of network management outsourcing services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection service that incorporates next generation behavior-based analysis technology to defend endpoints and physical and virtual servers against new malware assaults such as ransomware and email phishing, which routinely evade traditional signature-matching AV products. ProSight Active Security Monitoring protects local and cloud-based resources and offers a single platform to automate the entire threat lifecycle including filtering, detection, containment, remediation, and forensics. Top capabilities include single-click rollback using Windows Volume Shadow Copy Service and automatic network-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection (ESP) services deliver affordable in-depth security for physical and virtual servers, desktops, mobile devices, and Exchange email. ProSight ESP utilizes contextual security and advanced machine learning for round-the-clock monitoring and reacting to cyber assaults from all vectors. ProSight ESP delivers firewall protection, penetration alerts, device management, and web filtering through cutting-edge tools packaged within a single agent managed from a single console. Progent's data protection and virtualization experts can assist you to design and implement a ProSight ESP environment that meets your company's unique requirements and that allows you demonstrate compliance with government and industry data security standards. Progent will help you define and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alerts that require immediate action. Progent can also assist your company to install and verify a backup and restore system such as ProSight Data Protection Services so you can recover rapidly from a potentially disastrous security attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified endpoint security and Exchange email filtering.
ProSight DPS: Managed Backup
ProSight Data Protection Services from Progent offer small and mid-sized organizations an affordable and fully managed service for secure backup/disaster recovery. For a low monthly rate, ProSight DPS automates and monitors your backup activities and enables fast restoration of critical files, apps and virtual machines that have become unavailable or damaged as a result of component breakdowns, software bugs, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images/, as well as Microsoft Hyper-V and VMware images/. Critical data can be backed up on the cloud, to an on-promises device, or mirrored to both. Progent's BDR specialists can deliver world-class support to set up ProSight DPS to be compliant with regulatory standards like HIPPA, FINRA, and PCI and, when necessary, can assist you to recover your critical data. Find out more about ProSight Data Protection Services Managed Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the technology of leading information security companies to deliver centralized control and comprehensive protection for all your email traffic. The powerful structure of Progent's Email Guard integrates cloud-based filtering with a local gateway appliance to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne threats. The Cloud Protection Layer acts as a first line of defense and keeps most unwanted email from reaching your security perimeter. This decreases your vulnerability to external threats and saves network bandwidth and storage. Email Guard's on-premises gateway appliance provides a further level of analysis for inbound email. For outgoing email, the on-premises gateway provides AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also help Exchange Server to monitor and protect internal email traffic that stays within your corporate firewall. For more details, visit Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and apps hosted in a secure Tier III data center on a high-performance virtual machine host set up and maintained by Progent's network support experts. Under Progent's ProSight Virtual Hosting service model, the customer retains ownership of the data, the OS software, and the apps. Since the system is virtualized, it can be ported immediately to an alternate hosting solution without requiring a time-consuming and difficult configuration procedure. With ProSight Virtual Hosting, your business is not tied one hosting provider. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, update, retrieve and protect data related to your IT infrastructure, procedures, applications, and services. You can quickly find passwords or IP addresses and be warned about impending expirations of SSL certificates ,domains or warranties. By cleaning up and managing your network documentation, you can save as much as 50% of time wasted trying to find vital information about your network. ProSight IT Asset Management features a common repository for storing and collaborating on all documents required for managing your network infrastructure such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports advanced automation for collecting and associating IT information. Whether you’re planning improvements, performing regular maintenance, or responding to an emergency, ProSight IT Asset Management gets you the data you need as soon as you need it. Learn more about Progent's ProSight IT Asset Management service.
Expert Network Security Planning
Any company ought to develop a carefully considered security strategy that incorporates both pre-attack procedures and reaction planning. The pre-attack strategy is a set of procedures intended to minimize vulnerabilities. The post-attack strategy helps your company's security personnel to evaluate the damage caused by a security penetration, fix the network, document the event, and get the IT network restored as rapidly as possible.
Progent's certified IT security engineers can to assist your business to run a complete risk evaluation and create a computer security plan to establish security processes and mechanisms to minimize ongoing attacks and threats.
CISM Accredited Network Security Support Services
The CISM committee describes the core capabilities and global standards of performance that information security managers are required to learn. It gives business management the assurance that those who have earned their CISM credential have the background and capability to deliver efficient security administration and support services. Progent can provide the services of CISM certified security professionals to assist companies with:
Find out more information concerning Progent's CISM Qualified IS Security Consulting Services.
- Network Security Governance
- Risk Management
- Network Security Implementation Management
- IS Security Management
- Recovery Management
CISSP Accredited Security Engineering Expertise
The CISSP credential recognizes mastery of a global standard for network security. ANSI has awarded the CISSP credential recognition in the field of information security stipulated by ISO 17024. Progent offers access to of security professionals who have earned CISSP certification. Progent can provide a CISSP-certified professional to help your organization in a variety security fields including:
Find out more details concerning Progent's CISSP-certified Security Consulting Expertise.
- Security Management Practices
- Security Architecture and Models
- Access Management Solutions and Processes
- Software Development Security
- Secure Operations
- Site Security
- Cryptography Mechanisms
- Telecom, LAN and Internet Security
- Disaster Recovery Planning
CISSP-ISSAP Certified Secure Information System Architecture Engineering Support
Progent's CISSP-ISSAP qualified IT architecture professionals are experts who have earned ISSAP status through rigorous testing and extensive experience with information security design. The Information System Security Architecture Professional (ISSAP) credential represents demonstrated mastery in the more complex demands of IS security architecture within the wider scope of IS security knowledge required for CISSP certification. Progent's ISSAP-qualified security consultants can help your business with all aspects of secure network architecture including.
Read more details concerning Progent's ISSAP Certified Secure IT Architecture Consulting Services.
- Access Control Systems and Methodologies
- Phone System and Network Protection
- Encryption/Decryption Options
- Needs Analysis and Security Standards
- Business Continuity Planning and Disaster Recovery Planning (DRP)
- Site Security
CISA Qualified Security Auditing Consulting Support
The Certified Information Systems Auditor accreditation is a recognized qualification that represents expertise in information system security audit and control. Certified by the American National Standards Institute (ANSI), the CISA accreditation has candidates undergo an extensive examination given by the ISACA professional group. Progent's CISA-qualified information security audit experts are available to help your business in the areas of:
Learn more information about Progent's CISA Qualified Security Auditing Engineering Expertise.
- IS Audit Services
- Information Technology Governance
- Network Assets and Infrastructure Planned Useful Life
- Information Technology Service Delivery
- Safeguarding Data Assets
- Business Continuity Planning
Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC certification program was initiated by ISACA in 2010 to verify a consultant's skills to design, deploy, and support IS control mechanisms to reduce risk. Progent offers the services of a CRISC-certified engineer to help your company to create and execute a business continuity or disaster recovery plan that follows industry best practices promoted by CRISC and geared to align with your company's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC-certified network risk mitigation experts offer a range of risk identification services such as:
Read more details about Progent's CRISC Risk Management Consultants.
- Gather information and study documentation to evaluate major vulnerabilities
- Inventory statutory, regulatory, and business mandates and company standards associated with your information system to assess their potential impact on your business objectives
- Point out possible threats for your operational workflows to help in evaluating your enterprise risk
- Create a risk awareness initiative and provide seminars to make sure your organization appreciate IS risk so they can contribute to your risk control process
- Connect identified risk scenarios to your associated operational processes to help assign risk ownership
- Validate risk tolerance with executive leadership and major stakeholders to make sure they are in agreement
GIAC Accredited IS Security Engineering Support
Find out more details about Progent's GIAC Information Assurance Support.
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the skill of network security experts. GIAC's mission is to verify that an accredited professional possesses the skills needed to provide support in important categories of system, information, and application program security. GIAC accreditations are recognized by businesses and institutions throughout the world including and the United States NSA. Progent's GIAC-qualified information security audit specialists are available to assist your business in the areas of:
Contact a Progent Security Expert
To learn how to contact a security consultant for online or onsite support in West Virginia, phone 1-800-993-9400 or visit Remote Computer Help.