Greater Dallas Metro Area Contact Information:

Greater Dallas Metro Area Onsite IT Consulting
Progent locations in the Greater Dallas Metro Area

City Street Address Contact Information
Addison, TX 5080 Spectrum Drive
#1000e
Addison, Texas, 75001
Sales Phone: 469-317-9411

Link: Addison, TX Network Support Services
Allen, TX 1333 W McDermott Dr
Suite 150
Allen, Texas, 75013
Sales Phone: 469-342-0443

Link: Allen, TX Network Support Services
Dallas, TX 3710 Rawlins St
Suite 1420
Dallas, Texas, 75219
Sales Phone: 214-446-3777

Link: Dallas, TX Network Support Services
Fort Worth, TX 420 Throckmorton Street
Suite 200
Fort Worth, Texas, 76102
Sales Phone: 682-499-9550

Link: Fort Worth, TX Network Support Services
Irving, TX 5000 Riverside Dr
Suite 100 Bldg 6
Irving, Texas, 75202
Sales Phone: 469-565-9652

Link: Irving, TX Network Support Services
Plano, TX 5700 Granite Pkwy
Suite 200
Plano, Texas, 75024
Sales Phone: 469-929-2939

Link: Plano, TX Network Support Services
Southlake, TX 550 Reserve Street
Suite 190 & 250
Southlake, Texas, 76092
Sales Phone: 817-756-6968

Link: Southlake, TX Network Support Services

To get immediate remote assistance with data security problems, companies in Fort Worth, TX, can find expert support from Progent's certified security engineers. Progent's online service staff is ready to provide fast and affordable help with security problems that threaten the viability of your network. Progent's accredited security engineers are qualified to provide help for systems based on Windows, Linux, Apple macOS and OS X, Sun Solaris, and major derivatives of UNIX. Progent's broad array of consulting services covers firewall configuration, email filtering and encryption, secure system architecture, and disaster recovery preparedness. Progent's support staff has earned the industry's top security accreditations including Certified Information Systems Auditor (CISA) and ISSAP.

Progent offers remote security help on a by-the-minute basis without minimum minutes and no extra fees for setup or after hours support. By billing by the minute and by delivering world-class help, Progent's pricing policy keeps costs low and avoids situations where quick fixes result in big expenses.

Our System Has Been Attacked: What Are We Supposed to Do Now?
Cybersecurity ConsultingIn case your business is currently faced with a network security emergency, refer to Progent's Urgent Remote Computer Support to find out how to get immediate aid. Progent maintains a pool of certified network security specialists who can provide online and onsite support that includes containment, mitigation, recovery, forensics, and enhancement of your cybersecurity defense to protect against future attacks.

For organizations who have planned carefully for being hacked, the formal post-attack response model outlined by Global Information Assurance Certification is Progent's recommended method of handling a major security attack.

Introduction to Progent's Security Services
Managing network security as well as preparedness for restoring critical information and systems after an attack demands a continual process involving an array of tools and procedures. Progent's security consultants can support your business at any level in your efforts to protect your IT system, ranging from security assessments to creating a complete security plan. Important technologies covered by Progent's security engineers include Security Planning and Implementation, Data Restoration and Security Failure Analysis, and Outsourced Filtering of Email-Borne Attacks.

Planning and Building Protected Networks
Any organization should develop a thoroughly considered security plan that incorporates both proactive and reactive steps. The proactive strategy is a collection of steps that works to reduce vulnerabilities. The reactive plan defines procedures to assist IT staff to evaluate the losses caused by an attack, remediate the damage, document the event, and restore network activity as quickly as feasible. Progent can show you how to build security into your company operations. Progent can configure scanning software, define and implement a safe network architecture, and propose procedures and policies to enhance the protection of your computing environment. Progent's security experts are ready to help you to configure a firewall, design protected online and mobile access to e-mail and information, and install an efficient virtual private network (VPN).

If you are looking for an affordable way for outsourcing your network security administration, Progent's 24x7 Network Support Options include continual remote system tracking and fast response to problems.

Hybrid Cloud Solutions
Progent can help your IT team you to plan, deploy, administer and repair enterprise hybrid cloud solutions that incorporate physical and cloud hosted resources and that are compliant with regulatory data security requirements. (Learn about Progent's Office 365 integration with on-premises Exchange deployments, Microsoft Azure enterprise hybrid cloud integration and Progent's Amazon Web Services (AWS) enterprise hybrid cloud solutions.)

Data Restoration and Security Forensics
Progent offers skill in recovering networks and servers that have been compromised, are in question, or have failed because of a security attack. Progent can help evaluate the damage resulting from the breach, restore ordinary business operations, and retrieve data lost as a result of the assault. Progent's security specialists can also perform a comprehensive forensic evaluation by going over event logs and utilizing other proven forensics techniques. Progent's background with security problems minimizes your downtime and permits Progent to propose efficient measures to avoid or contain new attacks.

Progent's Fixed-price Managed Services for Information Security
Progent's affordable ProSight portfolio of outsourced network management services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. ProSight managed services available from Progent include:

ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection service that incorporates next generation behavior-based machine learning tools to guard endpoint devices and physical and virtual servers against new malware assaults like ransomware and file-less exploits, which routinely get by legacy signature-matching AV tools. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and offers a single platform to manage the entire malware attack progression including filtering, infiltration detection, mitigation, cleanup, and post-attack forensics. Key capabilities include single-click rollback with Windows Volume Shadow Copy Service and real-time network-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection managed services offer economical multi-layer security for physical servers and virtual machines, workstations, mobile devices, and Exchange email. ProSight ESP utilizes adaptive security and modern behavior analysis for continuously monitoring and responding to cyber threats from all vectors. ProSight ESP delivers firewall protection, intrusion alarms, endpoint control, and web filtering through leading-edge tools packaged within one agent accessible from a single control. Progent's data protection and virtualization experts can assist you to plan and configure a ProSight ESP deployment that addresses your organization's specific needs and that helps you demonstrate compliance with government and industry information protection regulations. Progent will help you specify and implement security policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alerts that call for urgent attention. Progent's consultants can also help you to install and verify a backup and restore solution like ProSight Data Protection Services (DPS) so you can recover quickly from a destructive cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Microsoft Exchange email filtering.

ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services from Progent provide small and mid-sized organizations an affordable and fully managed solution for secure backup/disaster recovery. Available at a low monthly cost, ProSight Data Protection Services automates your backup activities and allows rapid restoration of vital data, applications and virtual machines that have become lost or corrupted due to hardware breakdowns, software bugs, disasters, human error, or malware attacks like ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images, plus Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to an on-promises device, or to both. Progent's cloud backup consultants can deliver world-class expertise to configure ProSight Data Protection Services to to comply with government and industry regulatory requirements like HIPPA, FINRA, PCI and Safe Harbor and, whenever necessary, can assist you to restore your critical data. Find out more about ProSight DPS Managed Cloud Backup and Recovery.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the infrastructure of top information security companies to deliver web-based control and world-class protection for all your email traffic. The hybrid structure of Email Guard managed service combines cloud-based filtering with a local gateway appliance to provide complete defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based threats. The cloud filter serves as a first line of defense and keeps the vast majority of unwanted email from making it to your network firewall. This decreases your exposure to inbound attacks and conserves system bandwidth and storage. Email Guard's on-premises security gateway appliance provides a deeper level of inspection for incoming email. For outgoing email, the local security gateway provides AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also help Microsoft Exchange Server to monitor and safeguard internal email that stays inside your security perimeter. For more details, see Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its key servers and applications hosted in a protected Tier III data center on a high-performance virtual machine host configured and managed by Progent's network support professionals. With Progent's ProSight Virtual Hosting service model, the customer retains ownership of the data, the OS platforms, and the apps. Since the system is virtualized, it can be ported easily to an alternate hardware solution without a time-consuming and technically risky reinstallation procedure. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Find out more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, maintain, find and protect data related to your IT infrastructure, procedures, business apps, and services. You can instantly find passwords or IP addresses and be warned about impending expirations of SSL certificates or domains. By cleaning up and organizing your IT documentation, you can save up to 50% of time spent trying to find critical information about your network. ProSight IT Asset Management includes a common location for storing and sharing all documents related to managing your network infrastructure such as standard operating procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for collecting and associating IT information. Whether you’re making improvements, performing maintenance, or responding to a crisis, ProSight IT Asset Management gets you the information you require when you need it. Find out more about Progent's ProSight IT Asset Management service.

Special Security Expertise Offered by Progent
Progent's certified security consultants offer unique consulting support in vital facets of network protection including:

Vulnerability Evaluation and Security Compliance Testing
Progent offers expertise with information risk evaluation tools like Microsoft Baseline Security Analyzer or LANguard from GFI for performing a variety of automatic system scans to uncover possible security problems. Progent has broad experience with testing tools and can help you to understand assessment reports and respond appropriately. Progent's security consultants also can perform web application testing and can perform thorough assessments of corporate-wide security to assess your company's compliance with important global security standards including FISMA, PCI, and ISO. In addition, Progent can evaluate the strength of your wireless security covering in-place wireless equipment as well as portable handsets. Find out additional information about Progent's Security Vulnerability Evaluation and Security Compliance Testing.

Cisco Network Security, PIX and ASA Firewall, VPN, Aironet and Meraki Wi-Fi Expertise
Progent's Cisco Certified Internetwork Experts and Cisco Certified Network Professionals can provide in-depth technical services for Cisco's complete range of protection and VPN products such as PIX 500 Series Firewalls and ASA Series Firewalls, Catalyst FWSM, secure broadband and integrated services (IS) routers, wireless access points, Cisco Meraki cloud-managed Wi-Fi APs, and Catalyst family switches. Find out the details about Cisco Security, VPN and Aironet Wireless Consulting.

Additional Firewall and Virtual Private Network Technologies
In addition to supporting a wide range of network security solutions available from Microsoft and Cisco, Progent can provide organizations of any size advanced consulting for solutions from other popular firewall and Virtual Private Network vendors. Progent's engineers offer:

Unannounced Intrusion Testing Consulting
Unannounced penetration testing is a valuable method for allowing companies to find out how vulnerable their IT systems are to potential threats by revealing how effectively network security processes and technologies stand up against authorized but unannounced penetration efforts launched by seasoned security engineers using the latest intrusion techniques. Read additional information about Progent's Penetration Testing Services.

Certified Information Security Manager Security Consulting Services
Certified Information Security Manager Consultants for Fort Worth, TexasCertified Information Security Manager (CISM) identifies the core skills and international standards of performance that information technology security professionals are required to achieve. It provides executive management the assurance that those who have been awarded their accreditation possess the background and knowledge to provide efficient security administration and engineering support. Progent can provide a CISM consultant to assist your enterprise in critical security disciplines such as information protection governance, risk assessment, information protection process control, and crisis handling support.

Read additional details about Progent's CISM Security Consulting Expertise.

Certified Information Systems Security Professionals (CISSP) Security Support Expertise
CISSP Qualified Network Security Engineers for Fort Worth, TexasProgent's CISSP consultants are security specialists who have been awarded CISSP certification as a result of demonstrated professional work, extensive study, and formal examination. CISSP qualification indicates mastery of an international standard for IT security. ANSI has given the CISSP credential official recognition in the area of IT security under ISO/IEC 17024. Fields of expertise included within CISSP include security administration procedures, security design and models, access control systems, software development security, operations security, hardware security, cryptography, telecommunications, network security, and disaster recovery planning.

Read additional details concerning Progent's CISSP Consulting Expertise.

CISSP-ISSAP Qualified Experts for Secure Network Infrastructure
CISSP Information Systems Security Architecture Professionals (ISSAP) for Fort Worth, TexasProgent's ISSAP qualified security consultants have been awarded ISSAP status as a result of thorough examination and extensive experience. field experience with network security architecture. ISSAP security experts have in-depth knowledge of access control mechanisms and methodologies, telecommunications and network infrastructure protection, cryptography, requirements analysis, business continuity planning (BCP) and disaster recovery, and physical security integration. Progent's ISSAP-qualified security specialists can help your business with all aspects of secure network architecture.

Find out more information about Progent's ISSAP Certified Secure IT Architecture Consulting Services.

CISSP-ISSEP Certified Cybersecurity Engineering Consultants
CISSP-ISSEP certified Cybersecurity ConsultantsNetwork Security consultants who have earned CISSP-ISSEP (Information Systems Security Engineering Professional) certification have shown their ability to provide large organizations with the expertise associated with a senior systems engineer, information assurance systems engineer, information assurance officer, information assurance analyst, or senior cybersecurity analyst. Progent can provide the support of a certified CISSP-ISSEP cybersecurity expert to help your enterprise to follow current system security engineering principles and techniques in system development, review and evaluate system security designs based on security engineering best practices, create cohesive system designs that include compliant security features for all critical system functions, develop effective design and configuration strategies to deliver operational security, perform in-depth risk analysis, and recommend practical security models that balance your operational goals with your organization's risk tolerance.

Learn the details about Progent's CISSP-ISSEP Cybersecurity Engineering Consulting Services.

CISA Security Auditor Professional Services
CISA Cybersecurity Auditor Consultants for Fort Worth, TexasThe CISA credential is a prestigious achievement that signifies mastery in network security auditing. Certified by the American National Standards Institute (ANSI), the CISA accreditation has candidates pass an extensive test overseen by the ISACA international professional group. Progent can provide the expertise of a CISA-certified security audit engineer trained to help businesses in the areas of information systems audit process, information technology governance, systems and architecture lifecycle, IT service delivery, protecting information resources, and disaster recovery planning.

Read additional details about Progent's CISA Support Expertise.

CRISC-certified Network Risk Management Consultants
CRISC IT Risk Consultants for Fort Worth, TexasThe Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA in 2010 to verify an IT professional's skills to plan, deploy, and maintain information system control mechanisms to reduce network risk. Progent can provide the expertise of a CRISC-certified engineer to assist your company to create and carry out a business continuity strategy that follows industry best practices identified by CRISC and geared to match your company's risk tolerance, business goals, and budgetary guidelines. Progent's network risk management services are complementary to the support provided by Progent's CISA-qualified security engineers for objectively auditing your IT control mechanisms and also with the expertise of Progent's CISM-certified support professionals for designing security policies and procedures.

Get additional details concerning Progent's CRISC-certified IT Risk Mitigation Services.

GIAC Professional Expertise
Security Experts with GIAC Certification for Fort Worth, TexasGlobal Information Assurance Certification was founded in 1999 to validate the knowledge of computer security engineers. GIAC's goal is to verify that an accredited security consultant has the knowledge necessary to provide support in vital categories of system, data, and software security. GIAC accreditations are recognized by businesses and government organizations throughout the world including U.S. National Security Agency. Progent offers the expertise of GIAC certified professionals for all of the security services covered within GIAC certification programs such as auditing networks, security incident handling, traffic analysis, web-based application security, and security information and event management (SIEM) solutions.

Learn additional details about Progent's GIAC Information Assurance Services.

Depend on Progent for Computer Security Consulting Services
If your business is located in Fort Worth or anywhere in the state of Texas and you need cybersecurity help, call Progent at 800-993-9400 or go to Contact Progent.














© 2002- 2019 Progent Corporation. All rights reserved.