Business IT networks in Alabama can depend on prompt and economical online access to Progent's certified network security engineers to assist with complex security problems. The cost is reasonable, billing is per minute, engagement is fast, and support is world class. Progent also provides assistance for long-term projects that requires the expertise of senior security engineers with top security credentials.

In case your Alabama small business is situated some distance from major urban areas like Birmingham, Birmingham, Mobile, or Huntsville, contact with local accredited security professionals is often limited when there's an emergency. This can cause a drop in productivity for your company, angry clients, idle workers, and distracted management. By contacting Progent's remote support, you have access to a qualified security professional ready to offer help when you need it to keep your network running and salvage your data.

Progent can help you in a variety of ways in your efforts to defend your network with support services ranging from security audits to developing a company-wide security strategy. Progent offers affordable support to help companies of any size to set up and maintain safe networks based on Windows and Cisco products and that can include computers running UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus mobile users with Apple iPhones and iPads or Android or Windows Phone handsets.

Progent can also show you how to outsource spam blocking and protection from e-mail-based assaults. Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of top data security companies to deliver centralized control and world-class security for all your email traffic. The powerful architecture of Progent's Email Guard integrates cloud-based filtering with a local security gateway appliance to provide complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. ProSight Email Guard's cloud filter serves as a preliminary barricade and blocks the vast majority of threats from making it to your network firewall. This decreases your exposure to external threats and conserves network bandwidth and storage. ProSight Email Guard's on-premises security gateway device adds a further layer of inspection for incoming email. For outgoing email, the local security gateway offers AV and anti-spam protection, DLP, and encryption. The local security gateway can also help Microsoft Exchange Server to monitor and safeguard internal email that stays inside your corporate firewall.

Progent's security experts are available online or on premises to provide a range of emergency or longer-term computer security services which include:

  • Perform extensive security audits
  • Clean up quickly after serious security breaches
  • Install effective firewalls
  • Configure secure methods for remote and mobile access
  • Deploy effective utilities for protection against spam and directory harvest attacks
  • Develop a company-wide security plan with proactive security monitoring
  • Provide outsourced Call Center Services
  • Help Develop an effective data backup and business continuity plan based on Microsoft DPM backup/restore technology
If your company has an emergency requirement for computer security support, go to Progent's Urgent Remote Technical Help.

Progent's engineers provide world-class support in vital areas of computer security that include security evaluation, firewall and VPN expertise, and high-level security consulting.

Security Evaluation
Progent's expert security engineers can assess the vulnerability of your current network protection implementation through exhaustive remote automated analysis based on sophisticated utilities and tested procedures. Progent's skill in this testing saves your company consulting fees and offers a detailed portrayal of security holes. The knowledge your IT organization is provided can form the basis of a security strategy that can allow your network to operate safely and react quickly to new threats.

Automated Network Vulnerability Assessment
Progent provides consulting in the use of security analysis utilities such as MBSA and LANguard from GFI for affordably performing a variety of automatic network auditing checks to uncover potential security problems. Progent has extensive experience with other security analysis products including NMAP Port Scanner, AMAP Application Scanner, eEye Vulnerability Scanner, as well as tools like Metasploit Framework, Netcat, Hydra, and Nikto. Progent can show you how to make sense of testing reports and react effectively.

Progent can help you design protection into your company operations, install auditing tools, define and implement a protected system environment, and suggest procedures to maximize the safety of your network. Progent's security consultants are able to assist you to configure a firewall, design secure remote connectivity to email and business applications, and integrate VPN. Find out more concerning Progent's network security assessment.

Security Inventory Packages for Small Companies
Progent has put together two ultra-affordable security inventory and evaluation bundles intended to enable small companies to receive an independent network security assessment from a certified security engineer. With Progent's External Security Inventory Checkup, an engineer administers an extensive test of your network from beyond your company firewall to uncover potential weaknesses in the security posture you expose to the outside world. With Progent's Internal Network Security Inventory Scan, a security expert executes a network scan from an authorized computer inside your company firewall to uncover vulnerabilities to inside attacks. The two security inventory packages are set up and run from a secured external site. The project is overseen by an engineer who has earned high-level security accreditations and who generates a report that details and interprets the information collected by the security scan and proposes practical improvements where called for.

Network Security Penetration Analysis Consulting
Stealth penetration checking is an important component of any successful IT system security strategy. Progent’s security professionals can perform thorough penetration tests without the awareness of your organization's in-house network support resources. Unannounced penetration checking shows whether current security monitoring systems such as intrusion detection warnings and event log monitoring are properly set up and actively monitored. Learn more about Progent's stealth penetration testing support services.

Firewall and Virtual Private Network Expertise
Progent's background in security technology encompasses extensive field work with leading firewalls and Virtual Private Network technology offered by a variety of vendors including Cisco, Microsoft, and Symantec. Progent can provide the services of engineers with important networking accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Integration and Troubleshooting
The current ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide significantly more bang for the buck than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX security appliances for new installations. Following Cisco's purchase of Sourcefire, the whole line of Cisco ASA 5500-X firewalls can be configured to support Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed intrusion protection system. Firepower services bring powerful new features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can assist you to maintain your current PIX or ASA 5500 security appliances or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your organization to plan, configure, tune, administer and troubleshoot firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Read additional details about ASA Firewalls with Firepower configuration and troubleshooting services.

Cisco Network Security and VPN Consulting Services
Cisco's security and offsite connection products represent a complete range of easy-to-administer security solutions to help safeguard your wired and wireless information system. Cisco's Virtual Private Network line features routers, firewalls, intrusion detection systems and VPN appliances. Progent's expert staff of consultants includes experienced engineers with Cisco's CCIE and Cisco Certified Network Professional certifications who are able to assist your organization to select Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that fit most closely with your business objectives. Read more details concerning Progent's Support Services for Cisco Security Solutions and VPN Appliances.

Support Expertise for Additional Firewall and Virtual Private Network Technology
Progent offers small and mid-size businesses expert support for Intrusion Protection products and IPsec VPN solutions from leading firewall and VPN security companies such as WatchGuard, Juniper, and SonicWALL. Progent can help you create a comprehensive security plan and select the right technologies from multiple suppliers to support your security objectives while sticking within your budget restraints.

Progent's Low-Cost Managed Services for Information Security
Progent's low-cost ProSight line of managed services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates next generation behavior analysis tools to guard endpoints as well as servers and VMs against new malware assaults such as ransomware and email phishing, which routinely escape legacy signature-matching anti-virus tools. ProSight Active Security Monitoring protects local and cloud resources and offers a unified platform to automate the entire malware attack progression including filtering, infiltration detection, mitigation, remediation, and post-attack forensics. Top features include single-click rollback with Windows Volume Shadow Copy Service and real-time network-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.

ProSight Enhanced Security Protection: Unified Endpoint Security
ProSight Enhanced Security Protection (ESP) managed services offer affordable in-depth security for physical servers and VMs, desktops, smartphones, and Exchange Server. ProSight ESP utilizes adaptive security and modern behavior analysis for continuously monitoring and reacting to cyber assaults from all vectors. ProSight ESP provides two-way firewall protection, penetration alerts, device management, and web filtering via cutting-edge tools packaged within one agent accessible from a single control. Progent's data protection and virtualization consultants can assist your business to plan and implement a ProSight ESP deployment that addresses your company's unique requirements and that helps you prove compliance with legal and industry information security standards. Progent will assist you define and implement policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alarms that require immediate attention. Progent's consultants can also assist your company to install and test a backup and restore system like ProSight Data Protection Services (DPS) so you can get back in business rapidly from a destructive security attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Exchange filtering.

ProSight DPS: Managed Backup
ProSight Data Protection Services provide small and medium-sized organizations an affordable and fully managed solution for reliable backup/disaster recovery (BDR). For a fixed monthly price, ProSight Data Protection Services automates and monitors your backup activities and allows fast recovery of critical files, apps and VMs that have become unavailable or corrupted as a result of component failures, software glitches, natural disasters, human error, or malicious attacks like ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to a local device, or to both. Progent's BDR consultants can deliver advanced support to configure ProSight Data Protection Services to be compliant with regulatory requirements like HIPPA, FIRPA, PCI and Safe Harbor and, when necessary, can help you to restore your critical data. Learn more about ProSight Data Protection Services Managed Backup and Recovery.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the infrastructure of leading information security vendors to provide web-based management and world-class security for all your inbound and outbound email. The hybrid structure of Email Guard integrates cloud-based filtering with a local gateway appliance to provide complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. Email Guard's cloud filter serves as a first line of defense and keeps the vast majority of unwanted email from reaching your security perimeter. This decreases your exposure to external attacks and conserves network bandwidth and storage. Email Guard's onsite gateway device provides a further layer of analysis for incoming email. For outgoing email, the onsite gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite gateway can also help Microsoft Exchange Server to track and protect internal email traffic that stays within your security perimeter. For more information, visit ProSight Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and apps hosted in a secure fault tolerant data center on a high-performance virtual machine host set up and managed by Progent's network support professionals. With Progent's ProSight Virtual Hosting service model, the customer owns the data, the OS platforms, and the applications. Because the environment is virtualized, it can be moved easily to a different hardware environment without requiring a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, your business is not tied a single hosting service. Learn more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, maintain, retrieve and safeguard data about your IT infrastructure, procedures, applications, and services. You can instantly find passwords or serial numbers and be alerted automatically about impending expirations of SSLs or domains. By cleaning up and organizing your IT infrastructure documentation, you can eliminate as much as half of time thrown away searching for critical information about your IT network. ProSight IT Asset Management includes a common repository for holding and sharing all documents related to managing your business network such as recommended procedures and How-To's. ProSight IT Asset Management also offers advanced automation for collecting and relating IT information. Whether you’re planning enhancements, doing maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the information you require when you need it. Find out more details about Progent's ProSight IT Asset Management service.

Expert Network Security Consulting
Any business should develop a thoroughly considered security program that incorporates both preventive procedures and response planning. The proactive plan is a collection of mechanisms that help to minimize security weaknesses. The reactive strategy helps your company's IT security engineers to assess the damage caused by an attack, repair the system, document the event, and get the IT network restored as quickly as feasible.

Progent's certified IT security consultants can to help your business to run a full risk evaluation and create a computer security strategy to establish security processes and controls to mitigate ongoing attacks and dangers.

CISM Certified Information Security Consulting Assistance
The Certified Information Security Manager (CISM) organization defines the core competencies and worldwide standards of skill that IT security managers are required to learn. It gives business management the confidence that those who have earned their CISM credential have the experience and capability to deliver efficient security management and consulting services. Progent offers the expertise of CISM qualified security professionals to assist companies with:

  • Information Security Processes
  • Risk Management
  • Information Security Program Management
  • Information Security Administration
  • Recovery Planning
Find out more details concerning Progent's CISM Qualified Security Support Expertise.

CISSP Qualified Security Consulting Services
CISSP denotes expertise with an international standard for data security. ANSI (American National Standards Institute) has granted certification recognition in the field of data security under ISO 17024. Progent offers the services of security consultants who have earned CISSP accreditation. Progent can provide a CISSP-certified expert to help your enterprise in a broad range of security fields including:

  • Security Management Practices
  • Security Architecture and Paradigms
  • Access Management Systems and Methodology
  • Applications Development Security
  • Secure Operations
  • Site Security
  • Cryptography Technology
  • Telecommunications, Network and WAN Security
  • Business Continuity Preparedness
Find out additional details concerning Progent's CISSP Information Security Consulting Expertise.

CISSP-ISSAP Qualified Secure System Architecture Consulting Assistance
Progent's CISSP-ISSAP certified IT architecture professionals are consultants who have earned ISSAP Certification as a result of thorough testing and extensive work with information security architecture. The ISSAP certification indicates demonstrated competence in the more in-depth requirements of IS security architecture bounded by the broader scope of IS security knowledge required for CISSP accreditation. Progent's ISSAP-certified security experts can assist your company with all aspects of secure network architecture including.

  • Access Management Systems and Methodologies
  • Telecommunications and Network Security
  • Data Encryption Options
  • Requirements Evaluation and Security Guidelines
  • Business Continuity Planning and DRP
  • Site Security
Read more details concerning Progent's ISSAP Certified Secure IT Architecture Engineering Services.

CISA Qualified Network Security Auditing Consulting Support
The Certified Information Systems Auditor (CISA) accreditation is a prestigious achievement that signifies expertise in IS security auditing. Certified by ANSI, the CISA credential has candidates undergo a comprehensive examination given by the ISACA professional group. Progent's CISA security audit consultants can assist your IT organization in the areas of:

  • IS Audit Process
  • Information Technology Governance
  • Network Assets and Architecture Lifecycle
  • Information Technology Support
  • Safeguarding Data Resources
  • Business Continuity Preparedness
Get more information about Progent's CISA Certified IS Security Auditing Consulting Assistance.

CRISC Consultants
The CRISC certification program was initiated by ISACA to validate an IT professional's ability to design, implement, and maintain IS controls to mitigate network risk. Progent can provide the expertise of a CRISC-certified engineer to assist your company to create and carry out a workplace continuity or disaster recovery plan that follows leading practices promoted by CRISC and crafted to match your company's risk appetite, business goals, and IT budget. Progent's CRISC-certified network risk management engineers offer a variety of risk identification services such as:

  • Collect data and review documentation to evaluate significant risk scenarios
  • Identify legal, regulatory, and business requirements and company policies related to your network to assess their potential influence on your strategic objectives
  • Point out potential vulnerabilities for your operational processes to help in analyzing your enterprise risk
  • Create a risk awareness program and conduct seminars to ensure your stakeholders appreciate information system risk so they can contribute to your risk management program
  • Connect key risk vectors to your associated business procedures to help determine risk ownership
  • Determine risk tolerance with executive leadership and major stakeholders to make sure they align
Find out additional information concerning Progent's CRISC Risk Management Experts.

GIAC Qualified Information System Security Engineering Support
Global Information Assurance Certification was established in 1999 to certify the knowledge of information technology security professionals. GIAC's goal is to ensure that an accredited professional has the knowledge needed to deliver support in critical areas of network, information, and application software security. GIAC accreditations are recognized by businesses and government organizations all over the world including and the United States National Security Agency. Progent's GIAC-qualified IS security audit consultants can help your company with:

Find out additional information concerning Progent's GIAC Information Assurance Expertise.

Contact a Certified Security Expert
To see how to contact a certified Progent security engineer for remote or onsite help in Alabama, phone 1-800-993-9400 or go to Remote Computer Support.














© 2002- 2019 Progent Corporation. All rights reserved.