Business IT networks in Alabama can depend on prompt and economical online access to Progent's certified network security engineers to assist with complex security problems. The cost is reasonable, billing is per minute, engagement is fast, and support is world class. Progent also provides assistance for long-term projects that requires the expertise of senior security engineers with top security credentials.

In case your Alabama small business is situated some distance from major urban areas like Birmingham, Birmingham, Mobile, or Huntsville, contact with local accredited security professionals is often limited when there's an emergency. This can cause a drop in productivity for your company, angry clients, idle workers, and distracted management. By contacting Progent's remote support, you have access to a qualified security professional ready to offer help when you need it to keep your network running and salvage your data.

Progent can help you in a variety of ways in your efforts to defend your network with support services ranging from security audits to developing a company-wide security strategy. Progent offers affordable support to help companies of any size to set up and maintain safe networks based on Windows and Cisco products and that can include computers running UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus mobile users with Apple iPhones and iPads or Android or Windows Phone handsets.

Progent can also show you how to outsource spam blocking and protection from e-mail-based assaults. Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of top data security companies to deliver centralized control and world-class security for all your email traffic. The powerful architecture of Progent's Email Guard integrates cloud-based filtering with a local security gateway appliance to provide complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. ProSight Email Guard's cloud filter serves as a preliminary barricade and blocks the vast majority of threats from making it to your network firewall. This decreases your exposure to external threats and conserves network bandwidth and storage. ProSight Email Guard's on-premises security gateway device adds a further layer of inspection for incoming email. For outgoing email, the local security gateway offers AV and anti-spam protection, DLP, and encryption. The local security gateway can also help Microsoft Exchange Server to monitor and safeguard internal email that stays inside your corporate firewall.

Progent's security experts are available online or on premises to provide a range of emergency or longer-term computer security services which include:

  • Perform extensive security audits
  • Clean up quickly after serious security breaches
  • Install effective firewalls
  • Configure secure methods for remote and mobile access
  • Deploy effective utilities for protection against spam and directory harvest attacks
  • Develop a company-wide security plan with proactive security monitoring
  • Provide outsourced Call Center Services
  • Help Develop an effective data backup and business continuity plan based on Microsoft DPM backup/restore technology
If your company has an emergency requirement for computer security support, go to Progent's Urgent Remote Technical Help.

Progent's engineers provide world-class support in vital areas of computer security that include security evaluation, firewall and VPN expertise, and high-level security consulting.

Security Evaluation
Progent's expert security engineers can assess the vulnerability of your current network protection implementation through exhaustive remote automated analysis based on sophisticated utilities and tested procedures. Progent's skill in this testing saves your company consulting fees and offers a detailed portrayal of security holes. The knowledge your IT organization is provided can form the basis of a security strategy that can allow your network to operate safely and react quickly to new threats.

Automated Network Vulnerability Assessment
Progent provides consulting in the use of security analysis utilities such as MBSA and LANguard from GFI for affordably performing a variety of automatic network auditing checks to uncover potential security problems. Progent has extensive experience with other security analysis products including NMAP Port Scanner, AMAP Application Scanner, eEye Vulnerability Scanner, as well as tools like Metasploit Framework, Netcat, Hydra, and Nikto. Progent can show you how to make sense of testing reports and react effectively.

Progent can help you design protection into your company operations, install auditing tools, define and implement a protected system environment, and suggest procedures to maximize the safety of your network. Progent's security consultants are able to assist you to configure a firewall, design secure remote connectivity to email and business applications, and integrate VPN. Find out more concerning Progent's network security assessment.

Security Inventory Packages for Small Companies
Progent has put together two ultra-affordable security inventory and evaluation bundles intended to enable small companies to receive an independent network security assessment from a certified security engineer. With Progent's External Security Inventory Checkup, an engineer administers an extensive test of your network from beyond your company firewall to uncover potential weaknesses in the security posture you expose to the outside world. With Progent's Internal Network Security Inventory Scan, a security expert executes a network scan from an authorized computer inside your company firewall to uncover vulnerabilities to inside attacks. The two security inventory packages are set up and run from a secured external site. The project is overseen by an engineer who has earned high-level security accreditations and who generates a report that details and interprets the information collected by the security scan and proposes practical improvements where called for.

Network Security Penetration Analysis Consulting
Stealth penetration checking is an important component of any successful IT system security strategy. Progent’s security professionals can perform thorough penetration tests without the awareness of your organization's in-house network support resources. Unannounced penetration checking shows whether current security monitoring systems such as intrusion detection warnings and event log monitoring are properly set up and actively monitored. Learn more about Progent's stealth penetration testing support services.

Firewall and Virtual Private Network Expertise
Progent's background in security technology encompasses extensive field work with leading firewalls and Virtual Private Network technology offered by a variety of vendors including Cisco, Microsoft, and Symantec. Progent can provide the services of engineers with important networking accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Integration and Troubleshooting
The current ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide significantly more bang for the buck than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX security appliances for new installations. Following Cisco's purchase of Sourcefire, the whole line of Cisco ASA 5500-X firewalls can be configured to support Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed intrusion protection system. Firepower services bring powerful new features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can assist you to maintain your current PIX or ASA 5500 security appliances or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your organization to plan, configure, tune, administer and troubleshoot firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Read additional details about ASA Firewalls with Firepower configuration and troubleshooting services.

Cisco Network Security and VPN Consulting Services
Cisco's security and offsite connection products represent a complete range of easy-to-administer security solutions to help safeguard your wired and wireless information system. Cisco's Virtual Private Network line features routers, firewalls, intrusion detection systems and VPN appliances. Progent's expert staff of consultants includes experienced engineers with Cisco's CCIE and Cisco Certified Network Professional certifications who are able to assist your organization to select Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that fit most closely with your business objectives. Read more details concerning Progent's Support Services for Cisco Security Solutions and VPN Appliances.

Support Expertise for Additional Firewall and Virtual Private Network Technology
Progent offers small and mid-size businesses expert support for Intrusion Protection products and IPsec VPN solutions from leading firewall and VPN security companies such as WatchGuard, Juniper, and SonicWALL. Progent can help you create a comprehensive security plan and select the right technologies from multiple suppliers to support your security objectives while sticking within your budget restraints.

Progent's Low-Cost Managed Services for Information Security
Progent's low-cost ProSight line of managed services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates next generation behavior analysis tools to guard endpoints as well as servers and VMs against new malware assaults such as ransomware and email phishing, which routinely escape legacy signature-matching anti-virus tools. ProSight Active Security Monitoring protects local and cloud resources and offers a unified platform to automate the entire malware attack progression including filtering, infiltration detection, mitigation, remediation, and post-attack forensics. Top features include single-click rollback with Windows Volume Shadow Copy Service and real-time network-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.

ProSight Enhanced Security Protection: Unified Endpoint Security
ProSight Enhanced Security Protection (ESP) managed services offer affordable in-depth security for physical servers and VMs, desktops, smartphones, and Exchange Server. ProSight ESP utilizes adaptive security and modern behavior analysis for continuously monitoring and reacting to cyber assaults from all vectors. ProSight ESP provides two-way firewall protection, penetration alerts, device management, and web filtering via cutting-edge tools packaged within one agent accessible from a single control. Progent's data protection and virtualization consultants can assist your business to plan and implement a ProSight ESP deployment that addresses your company's unique requirements and that helps you prove compliance with legal and industry information security standards. Progent will assist you define and implement policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alarms that require immediate attention. Progent's consultants can also assist your company to install and test a backup and restore system like ProSight Data Protection Services (DPS) so you can get back in business rapidly from a destructive security attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Exchange filtering.

ProSight DPS: Managed Backup
ProSight Data Protection Services provide small and medium-sized organizations an affordable and fully managed solution for reliable backup/disaster recovery (BDR). For a fixed monthly price, ProSight Data Protection Services automates and monitors your backup activities and allows fast recovery of critical files, apps and VMs that have become unavailable or corrupted as a result of component failures, software glitches, natural disasters, human error, or malicious attacks like ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to a local device, or to both. Progent's BDR consultants can deliver advanced support to configure ProSight Data Protection Services to be compliant with regulatory requirements like HIPPA, FIRPA, PCI and Safe Harbor and, when necessary, can help you to restore your critical data. Learn more about ProSight Data Protection Services Managed Backup and Recovery.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the infrastructure of leading information security vendors to provide web-based management and world-class security for all your inbound and outbound email. The hybrid structure of Email Guard integrates cloud-based filtering with a local gateway appliance to provide complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. Email Guard's cloud filter serves as a first line of defense and keeps the vast majority of unwanted email from reaching your security perimeter. This decreases your exposure to external attacks and conserves network bandwidth and storage. Email Guard's onsite gateway device provides a further layer of analysis for incoming email. For outgoing email, the onsite gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite gateway can also help Microsoft Exchange Server to track and protect internal email traffic that stays within your security perimeter. For more information, visit ProSight Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and apps hosted in a secure fault tolerant data center on a high-performance virtual machine host set up and managed by Progent's network support professionals. With Progent's ProSight Virtual Hosting service model, the customer owns the data, the OS platforms, and the applications. Because the environment is virtualized, it can be moved easily to a different hardware environment without requiring a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, your business is not tied a single hosting service. Learn more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, maintain, retrieve and safeguard data about your IT infrastructure, procedures, applications, and services. You can instantly find passwords or serial numbers and be alerted automatically about impending expirations of SSLs or domains. By cleaning up and organizing your IT infrastructure documentation, you can eliminate as much as half of time thrown away searching for critical information about your IT network. ProSight IT Asset Management includes a common repository for holding and sharing all documents related to managing your business network such as recommended procedures and How-To's. ProSight IT Asset Management also offers advanced automation for collecting and relating IT information. Whether you’re planning enhancements, doing maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the information you require when you need it. Find out more details about Progent's ProSight IT Asset Management service.

Expert Network Security Consulting
Any business should develop a thoroughly considered security program that incorporates both preventive procedures and response planning. The proactive plan is a collection of mechanisms that help to minimize security weaknesses. The reactive strategy helps your company's IT security engineers to assess the damage caused by an attack, repair the system, document the event, and get the IT network restored as quickly as feasible.

Progent's certified IT security consultants can to help your business to run a full risk evaluation and create a computer security strategy to establish security processes and controls to mitigate ongoing attacks and dangers.

CISM Certified Information Security Consulting Assistance
The Certified Information Security Manager (CISM) organization defines the core competencies and worldwide standards of skill that IT security managers are required to learn. It gives business management the confidence that those who have earned their CISM credential have the experience and capability to deliver efficient security management and consulting services. Progent offers the expertise of CISM qualified security professionals to assist companies with:

  • Information Security Processes
  • Risk Management
  • Information Security Program Management
  • Information Security Administration
  • Recovery Planning
Find out more details concerning Progent's CISM Qualified Security Support Expertise.

CISSP Qualified Security Consulting Services
CISSP denotes expertise with an international standard for data security. ANSI (American National Standards Institute) has granted certification recognition in the field of data security under ISO 17024. Progent offers the services of security consultants who have earned CISSP accreditation. Progent can provide a CISSP-certified expert to help your enterprise in a broad range of security fields including:

  • Security Management Practices
  • Security Architecture and Paradigms
  • Access Management Systems and Methodology
  • Applications Development Security
  • Secure Operations
  • Site Security
  • Cryptography Technology
  • Telecommunications, Network and WAN Security
  • Business Continuity Preparedness
Find out additional details concerning Progent's CISSP Security Consulting Services.

ISSAP Certified Secure Network Architecture Engineering Assistance
Progent's ISSAP qualified network architecture professionals are experts who have earned ISSAP Certification through thorough testing and significant work with network security architecture. The ISSAP certification indicates proven skill in the more challenging demands of information system security architecture bounded by the wider scope of information security knowledge needed for CISSP certification. Progent's ISSAP-qualified security specialists can assist your company with all phases of secure network architecture including.

  • Access Control Mechanisms and Methodologies
  • Telecommunications and Network Protection
  • Data Encryption Options
  • Requirements Analysis and Security Standards
  • BCP and Disaster Recovery Planning
  • Site Security
Find out additional information about Progent's ISSAP Qualified Secure Network Architecture Consulting Expertise.

CISA Qualified Security Auditing Consulting Assistance
The Certified Information Systems Auditor (CISA) accreditation is an important achievement that signifies mastery in network security audit and control. Accredited by ANSI, the CISA credential has candidates undergo a comprehensive examination administered by the ISACA international professional association. Progent's CISA-qualified information security audit specialists are available to assist your IT organization in the areas of:

  • IS Audit Process
  • Information Technology Governance
  • Systems and Architecture Lifecycle
  • Information Technology Support
  • Safeguarding Data Resources
  • Disaster Recovery Planning
Read additional details concerning Progent's CISA Qualified IS Security Auditing Engineering Assistance.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC certification program was initiated by ISACA to validate a consultant's ability to design, deploy, and support information system control mechanisms to reduce network risk. Progent offers the services of a CRISC-certified engineer to assist your company to develop and carry out a workplace continuity or disaster recovery plan based on industry best practices promoted by CRISC and geared to match your organization's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC IT risk mitigation engineers can provide a range of risk evaluation services such as:

  • Collect information and study documentation to identify significant risk scenarios
  • Identify legal, regulatory, and contractual mandates and organizational policies associated with your information system to assess their possible impact on your strategic objectives
  • Point out possible vulnerabilities for your business workflows to assist in analyzing your corporate risk
  • Develop a risk awareness initiative and conduct training to ensure your organization understand IT risk so they can contribute to your risk management process
  • Connect key risk vectors to related business processes to help assign risk ownership
  • Validate risk appetite with your senior management and key stakeholders to ensure they are in agreement
Learn the details concerning Progent's CRISC Experts.

GIAC Certified Network Security Engineering Services
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the knowledge of network security experts. GIAC's goal is to make sure that a certified professional has the skills appropriate to deliver services in important categories of network, data, and application program security. GIAC accreditations are recognized by businesses and government organizations throughout the world including and the U.S. NSA. Progent's GIAC information security audit experts are available to help your IT organization with:

  • Assessing Networks
  • Incident Handling
  • Traffic Analysis
  • Web-based Application Security
  • SIEM solutions
Find out additional information about Progent's GIAC Information Assurance Expertise.

Contact a Certified Progent Security Expert
To learn how to access a certified Progent security engineer for online or onsite help in Alabama, call 1-800-993-9400 or visit Online Network Support.

© 2002- 2018 Progent Corporation. All rights reserved.