Company information networks in Wisconsin now have prompt and affordable remote access to Progent's qualified network security experts to assist with critical security issues. The cost is affordable, charges are by the minute, engagement is quick, and service is world class. Progent also offers help for complex engagements that demand the expertise of senior security consultants with top security credentials.
If your Wisconsin office is situated away from more populated urban neighborhoods including Milwaukee, Madison, Green Bay, or Kenosha, contact with nearby qualified network security experts may be limited during a security disaster. This can result in a loss of revenue for your company, upset clients, unproductive employees, and distracted management. By calling Progent, you have access to a certified security consultant ready to offer assistance when you need it to get your information system operating and salvage your data.
Progent can assist you in your efforts to protect your network with support services that can range from network security checks to developing a comprehensive security plan. Progent offers economical service to assist small and midsize companies to design and manage secure IT environments powered by Windows and Cisco technology and that can include computers based on UNIX or Linux platforms as well as BYOD clients with Apple iOS handhelds or Google Android or Windows Phone smart phones and tablets.
Progent can also show you how to outsource spam filtering and defense against e-mail-based security threats. Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of leading data security vendors to provide centralized control and world-class security for all your inbound and outbound email. The hybrid architecture of Email Guard combines cloud-based filtering with a local security gateway appliance to provide advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The Cloud Protection Layer acts as a preliminary barricade and blocks the vast majority of unwanted email from reaching your security perimeter. This reduces your vulnerability to external attacks and saves system bandwidth and storage. ProSight Email Guard's on-premises gateway device provides a deeper layer of inspection for incoming email. For outgoing email, the local security gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and encryption. The local security gateway can also enable Microsoft Exchange Server to monitor and safeguard internal email that stays within your security perimeter.
Progent's security consultants are available remotely or on premises to offer a range of emergency or longer-term computer security services such as:
If your business has an urgent need for IT security support, go to Progent's Urgent Online Technical Support.
- Perform extensive security evaluations
- Recover promptly after attacks
- Install effective firewalls
- Implement safe methods for offsite and mobile access
- Install advanced solutions for automatic defense against viruses, spam and DHAs
- Develop a comprehensive security strategy with 24x7 network monitoring
- Offer comprehensive Help Desk Support
- Help Develop a practical backup and restore solution centered on Microsoft DPM backup/restore technology
Progent's consultants can deliver advanced support in vital facets of network security that include analysis, firewalls and VPN, and high-level security planning.
Progent's certified security engineers can evaluate the vulnerability of your current computer protection implementation through exhaustive remote automated analysis based on advanced utilities and tested techniques. Progent's experience in administering this service saves your company consulting fees and assures an accurate portrayal of system vulnerability. The information your company is provided can make up the foundation of a network protection plan that will allow your information system to operate safely and adapt quickly to new risks.
Automated Network Security Audits
Progent provides consulting in the application of security analysis packages including Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard NSS for economically performing a variety of automatic network testing checks to uncover potential security holes. Progent has extensive knowledge of additional network analysis utilities such as NMAP, AMAP Application Scanner, eEye, as well as tools such as Metasploit Framework, Netcat, Socat, and Nikto. Progent can help you to make sense of audit reports and respond effectively.
Progent can show you how to build protection into your business processes, install scanning tools, define and deploy a protected network architecture, and suggest procedures to maximize the safety of your IT system. Progent's security professionals are ready to show you how to set up a firewall, design secure remote access to email and data, and integrate virtual private network. Learn additional information about Progent's network security analysis.
Security Inventory Service Bundles for Small Companies
Progent offers two low-cost security inventory scanning bundles designed to allow small businesses to get a professional network security assessment from a qualified security consultant. With Progent's External Network Security Inventory Scan, a security engineer runs an extensive examination of your network from outside your firewalled perimeter to uncover possible weaknesses in the security posture you present to the public. With Progent's Internal Network Security Inventory Checkup, a certified security professional executes a system scan from a secure computer within your firewall to evaluate the risk to internal threats. The two security inventory packages are set up and executed from a secured remote location. The process is overseen by a consultant who has earned high-level security credentials and who produces a document that details and interprets the information captured by the scan and suggests cost-effective improvements if appropriate.
Stealth Security Penetration Testing Consulting
Stealth intrusion testing is an important part of any serious network security strategy. Progentís security professionals can run extensive intrusion tests without the awareness of your company's in-house IT resources. Stealth penetration testing shows whether existing security defense systems such as intrusion detection warnings and event history monitoring are correctly set up and consistently monitored. Find out additional information concerning Progent's network penetration analysis support services.
Firewalls and VPN Support
Progent's background in security technology includes in-depth field work with leading firewalls and VPN technology from multiple vendors such as Cisco, Microsoft, and Symantec. Progent can provide the services of consultants who have earned important networking accreditations such as CCIE and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Configuration and Debugging
The current Cisco ASA 5500-X Series of firewalls with Firepower Services offer significantly more bang for the buck than Cisco's previous firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new installations. Since Cisco's purchase of Sourcefire, the entire family of ASA 5500-X devices can be configured to support Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed intrusion protection system (IPS). Firepower services provide enhanced capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can assist your company to maintain your legacy PIX or ASA 5500 firewalls and migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your business to plan, configure, tune, manage and troubleshoot firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Read more information about Cisco ASA 5500-X Firewalls with Firepower Services configuration and troubleshooting services.
Cisco Security and VPN Engineering Services
Cisco's security and remote access products provide a comprehensive line of easy-to-administer security solutions to help safeguard your wired and wireless information system. Cisco's VPN product family features switches, firewalls, intrusion detection devices and VPN concentrators. Progent's expert consulting staff includes experienced specialists with Cisco's Certified Internetwork Expert and CCNP qualifications who are able to assist your organization to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that fit most closely with your business objectives. Learn more information about Progent's Engineering Services for Cisco Security Technology and Virtual Private Network Products.
Consulting Services for Additional Firewall and VPN Products
Progent offers small and mid-size businesses expert support for Intrusion Protection products and IPsec VPN products from leading firewall and VPN security vendors such as Check Point Software, Juniper, and SonicWALL. Progent can show you how to create a comprehensive security strategy and choose appropriate technologies from a variety of suppliers to support your security goals while sticking within your budget limits.
Progent's Low-Cost Managed Services for Information Security
Progent's affordable ProSight family of network monitoring and management services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that utilizes cutting edge behavior analysis tools to guard endpoints as well as physical and virtual servers against modern malware assaults like ransomware and email phishing, which easily get by legacy signature-based anti-virus tools. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and offers a single platform to automate the entire malware attack lifecycle including filtering, infiltration detection, mitigation, cleanup, and post-attack forensics. Top features include single-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection managed services deliver economical multi-layer protection for physical servers and VMs, workstations, mobile devices, and Exchange email. ProSight ESP utilizes adaptive security and modern behavior analysis for round-the-clock monitoring and responding to cyber threats from all vectors. ProSight ESP provides firewall protection, intrusion alarms, endpoint control, and web filtering through cutting-edge tools incorporated within one agent managed from a single console. Progent's security and virtualization consultants can help your business to design and configure a ProSight ESP environment that addresses your organization's unique needs and that helps you demonstrate compliance with government and industry data protection regulations. Progent will assist you specify and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alarms that require immediate action. Progent can also assist your company to set up and verify a backup and restore system such as ProSight Data Protection Services so you can recover rapidly from a potentially disastrous cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Microsoft Exchange email filtering.
ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services offer small and medium-sized businesses an affordable and fully managed solution for secure backup/disaster recovery. For a fixed monthly cost, ProSight Data Protection Services automates and monitors your backup processes and enables fast restoration of vital files, apps and virtual machines that have become lost or damaged as a result of component failures, software bugs, disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, apps, system images/, plus Hyper-V and VMware virtual machine images/. Important data can be protected on the cloud, to a local device, or mirrored to both. Progent's backup and recovery specialists can provide advanced expertise to set up ProSight Data Protection Services to to comply with regulatory standards like HIPPA, FINRA, PCI and Safe Harbor and, when necessary, can assist you to recover your business-critical information. Find out more about ProSight Data Protection Services Managed Cloud Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the technology of top data security companies to deliver centralized management and comprehensive protection for your email traffic. The hybrid architecture of Progent's Email Guard managed service combines a Cloud Protection Layer with a local security gateway device to provide complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The Cloud Protection Layer serves as a preliminary barricade and blocks most unwanted email from making it to your network firewall. This decreases your exposure to external threats and saves system bandwidth and storage. Email Guard's on-premises gateway device provides a further layer of analysis for incoming email. For outbound email, the local gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The onsite security gateway can also help Microsoft Exchange Server to track and safeguard internal email that stays within your security perimeter. For more information, see ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its key servers and apps hosted in a protected fault tolerant data center on a fast virtual host set up and maintained by Progent's network support professionals. Under the ProSight Virtual Hosting model, the client owns the data, the OS software, and the applications. Because the environment is virtualized, it can be ported immediately to an alternate hosting environment without requiring a lengthy and difficult reinstallation procedure. With ProSight Virtual Hosting, your business is not tied a single hosting provider. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, update, retrieve and protect data related to your IT infrastructure, processes, applications, and services. You can instantly locate passwords or IP addresses and be warned automatically about upcoming expirations of SSL certificates or domains. By updating and managing your IT infrastructure documentation, you can save as much as 50% of time thrown away trying to find vital information about your IT network. ProSight IT Asset Management includes a common location for holding and collaborating on all documents related to managing your business network like standard operating procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for collecting and associating IT data. Whether youíre planning improvements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the data you need as soon as you need it. Learn more details about Progent's ProSight IT Asset Management service.
Expert Network Security Consulting
Every business ought to have a carefully considered security strategy that includes both proactive procedures and response plans. The proactive plan is a collection of steps intended to minimize security weaknesses. The reactive strategy helps your company's security engineers to evaluate the impact caused by an attack, fix the damage, document the event, and get business functions operational as rapidly as possible.
Progent's expert information security consultants are available to assist your company to run a full vulnerability evaluation and create a company-wide security plan to establish security processes and controls to reduce future assaults and threats.
CISM Qualified Information Security Support Services
The CISM organization describes the basic capabilities and worldwide standards of performance that information security managers are expected to learn. It provides executive management the confidence that consultants who have earned their CISM certification possess the experience and capability to deliver efficient security management and consulting consulting. Progent can provide the expertise of CISM certified security consultants to assist businesses with:
Find out additional details about Progent's CISM IS Security Consulting Services.
- IS Security Processes
- Risk Management
- IS Security Program Management
- Information Security Administration
- Response Management
CISSP Qualified Security Consulting Support
CISSP recognizes mastery of a worldwide standard for network security. The American National Standards Institute has granted the CISSP credential accreditation in the field of data protection stipulated by ISO/IEC 17024. Progent can provide access to of security professionals who have earned CISSP certification. Progent can provide a CISSP-certified professional to help your company in a broad range of security fields including:
Learn more details concerning Progent's CISSP-certified Security Consulting Professionals.
- Security Management Procedures
- Security Architecture and Paradigms
- Access Management Solutions and Methodology
- Applications Development Security
- Operations Security
- Site Security
- Cryptography Technology
- Telecommunications, Network and WAN Security
- Business Continuity Planning
CISSP-ISSAP Certified Secure Information System Architecture Engineering Expertise
Progent's CISSP-ISSAP certified IT architecture engineers are consultants who have been awarded ISSAP status as a result of thorough testing and extensive experience with information security design. The ISSAP credential represents proven mastery in the more in-depth demands of information security architecture bounded by the broader scope of IS security expertise required for CISSP accreditation. Progent's ISSAP-certified security experts can assist your company with all phases of architecture security including.
Find out more information about Progent's ISSAP Qualified Secure Information System Architecture Engineering Professionals.
- Access Control Systems and Methodologies
- Telecom and Network Infrastructure Security
- Cryptography Solutions
- Requirements Analysis and Security Criteria
- Business Continuity Planning and Disaster Recovery Planning
- Site Security
CISA Certified Information System Security Auditing Engineering Services
The CISA credential is a globally recognized achievement that represents mastery in IS security auditing. Certified by ANSI, the CISA credential requires that consultants undergo a comprehensive test administered by the ISACA international professional association. Progent's CISA-certified IS security audit specialists are available to help your business with:
Get more details about Progent's CISA Qualified Information System Security Auditing Consulting Assistance.
- Information Systems Audit Services
- IT Enforcement
- Network Assets and Architecture Lifecycle
- IT Service Delivery
- Safeguarding Data Assets
- Disaster Recovery Preparedness
Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA to validate a consultant's skills to plan, implement, and maintain IS control mechanisms to reduce network risk. Progent can provide the expertise of a CRISC-certified engineer to assist your company to develop and execute a workplace continuity or disaster recovery strategy that follows leading practices promoted by CRISC and crafted to match your organization's risk tolerance, business goals, and IT budget. Progent's CRISC network risk management experts offer a range of risk identification services such as:
Find out more details concerning Progent's CRISC Risk Management Consultants.
- Gather information and study documentation to help identify major risk scenarios
- Identify statutory, regulatory, and business requirements and organizational policies associated with your network to assess their possible influence on your business objectives
- Point out possible vulnerabilities for your business processes to assist in evaluating your corporate risk
- Create a risk awareness program and conduct seminars to make sure your organization understand information system risk so they can contribute to your risk management process
- Match identified risk scenarios to related business processes to help determine risk responsibility
- Validate risk tolerance with your senior management and key stakeholders to make sure they align
GIAC Qualified IS Security Engineering Assistance
Global Information Assurance Certification was established in 1999 to validate the skill of computer security professionals. GIAC's goal is to ensure that a certified professional has the knowledge appropriate to deliver support in critical areas of system, data, and application software security. GIAC accreditations are acknowledged by companies and institutions throughout the world including and the U.S. NSA. Progent's GIAC IS security audit experts can help your IT organization in the areas of:
Read additional information concerning Progent's GIAC Information Assurance Support.
- Assessing IT Infrastructure
- Incident Response
- Intrusion Detection
- Web Application Security
- SIEM solutions
Contact a Certified Security Specialist
To find out how you can contact a security engineer for online or onsite support in Wisconsin, call 1-800-993-9400 or go to Online Network Help.
© 2002-2019 Progent Corporation. All rights reserved.