Small business computer networks in the state of Arizona can depend on prompt and economical remote help from Progent's certified network security experts to help with urgent security issues. Rates are competitive, billing is per minute, sign-up is immediate, and support is world class. Progent also provides help for long-term projects that demand the knowledge of seasoned security consultants with high-level security certifications.

In case your Arizona small business is outside of more populated urban areas like Phoenix, Tucson, Mesa, or Glendale, help from nearby certified security support specialists is often limited when there's an urgent situation. This can result in lost productivity for your business, upset customers, unproductive employees, and distracted management. By calling Progent's online services, you have access to a qualified security engineer ready to provide expertise when you require it to keep your network operating and restore your information.

Progent can assist you at any level in your efforts to defend your network with support services ranging from network security audits to creating a company-wide security strategy. Progent provides affordable service to help businesses of all sizes to design and manage safe IT environments powered by Windows and Cisco products and that may include servers and desktops based on UNIX, Linux, Sun Solaris, or Mac OS X platforms as well as BYOD clients with Apple handhelds or Google Android or Windows Phone smart phones and tablets.

Progent can also show you how to outsource spam blocking and defense against e-mail-based security threats. Email Guard is Progent's email filtering and encryption solution that uses the technology of top information security vendors to deliver web-based management and comprehensive protection for all your inbound and outbound email. The powerful architecture of Email Guard managed service combines a Cloud Protection Layer with a local security gateway appliance to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne malware. ProSight Email Guard's cloud filter acts as a first line of defense and keeps the vast majority of threats from making it to your network firewall. This reduces your exposure to inbound threats and conserves system bandwidth and storage space. ProSight Email Guard's onsite gateway appliance adds a further layer of analysis for incoming email. For outgoing email, the onsite gateway provides AV and anti-spam filtering, DLP, and encryption. The local gateway can also enable Microsoft Exchange Server to monitor and protect internal email traffic that originates and ends within your corporate firewall.

Progent's certified engineers are available online or on site to offer a range of emergency or project-based IT security services such as:

  • Run extensive network security audits
  • Clean up rapidly after serious security breaches
  • Configure effective firewalls
  • Configure secure solutions for offsite and mobile access
  • Deploy effective software for protection against viruses, spam and DHAs
  • Develop a company-wide security plan with round-the-clock security monitoring
  • Provide outsourced Help Desk Support
  • Develop an effective data backup and business continuity solution based on Data Protection Manager backup capability
If your network has an urgent need for IT security support, refer to Progent's Emergency Online Network Support.

Progent's consultants offer world-class support in vital areas of computer protection including analysis, firewalls and VPN, and high-level security consulting.

System Evaluation
Progent's expert security engineers can assess the strength of your current computer security environment through exhaustive remote automated testing via sophisticated utilities and tested procedures. Progent's skill in this testing saves your company consulting fees and assures an objective portrayal of security holes. The information your IT organization gains can form the foundation of a network protection plan that can permit your network to operate safely and react rapidly to new risks.

Automated Network Security Evaluation
Progent offers expertise in the application of security auditing products including MBSA and GFI LANguard Network Security Scanner for affordably performing a variety of programmed system auditing checks to identify possible security vulnerabilities. Progent has broad knowledge of other network auditing tools including NMAP Port Scanner, AMAP Application Scanner, eEye Vulnerability Scanner, as well as tools such as SolarWinds, Hydra, and Nikto. Progent can help you to understand audit reports and respond appropriately.

Progent can help you build security into your business operations, install scanning tools, plan and implement a secure network architecture, and recommend procedures to maximize the safety of your IT system. Progent's security professionals are ready to show you how to configure a firewall, design secure remote access to email and data, and integrate VPN. Find out additional information on Progent's network security evaluation.

Security Inventory Service Bundles for Small Companies
Progent has put together two low-cost security inventory service packages intended to enable small companies to receive a professional security assessment from an accredited security expert. With Progent's External Security Inventory Scan, an engineer runs a comprehensive examination of your network from beyond your firewalled perimeter to uncover possible weaknesses in the security profile you expose to the outside world. With Progent's Internal Network Security Inventory Scan, a security engineer executes a network scan from an authorized computer inside your company firewall to uncover the risk to internal attacks. Both security inventory packages are configured and run from a protected remote site. The project is overseen by a consultant who has earned high-level security credentials and who produces a document that summarizes and interprets the information collected by the scan and proposes cost-effective remediation if called for.

Stealth Intrusion Analysis Consulting
Stealth intrusion testing is an important part of any serious network security plan. Progentís security professionals can perform extensive intrusion checks without the knowledge of your organization's internal network support resources. Stealth penetration checking shows whether existing security monitoring systems such as intrusion detection alerts and event log analysis are properly configured and actively monitored. Learn more on Progent's stealth security penetration testing support services.

Firewalls and VPN Solutions
Progent's expertise in network security technology includes in-depth familiarity with leading firewalls and Virtual Private Network products from multiple vendors including Cisco, Microsoft, and CheckPoint. Progent can provide the support of engineers with important industry accreditations including Cisco Certified Internetwork Expert and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Troubleshooting
The current Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide substantially more bang for the buck than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX firewalls for all new installations. Since Cisco's purchase of Sourcefire, the whole family of ASA 5500-X devices can be provisioned to enable Firepower Services, built on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system. Firepower services provide enhanced capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist you to manage your legacy PIX or Cisco ASA 5500 firewalls and migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your organization to plan, integrate, tune, administer and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. See additional information about ASA Firewalls with Firepower Services integration and troubleshooting support.

Cisco Network Security and VPN Support Services
Cisco's network security and offsite access products provide a comprehensive line of easy-to-administer security solutions to help protect your wired and wireless network infrastructure. Cisco's Virtual Private Network product family features routers, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's expert consulting staff includes experienced specialists with Cisco CCIE and Cisco Certified Network Professional certifications who can help your business to select Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that align best with your company objectives. Read more information concerning Progent's Engineering Expertise for Cisco Security Technology and VPN Products.

Engineering Services for Other Firewall and VPN Products
Progent provides small and medium size organizations professional support for Intrusion Protection products and IPsec VPN solutions from leading firewall and VPN security companies including Check Point Software, Juniper Networks, and Symantec. Progent can help you design a detailed security plan and select appropriate products from multiple vendors to support your security objectives while sticking within your spending restraints.

Progent's Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight family of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance. ProSight managed services available from Progent include:
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email security solution that incorporates the services and infrastructure of leading information security vendors to provide web-based management and comprehensive security for all your inbound and outbound email. The powerful architecture of Progent's Email Guard managed service combines a Cloud Protection Layer with an on-premises security gateway appliance to provide complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based threats. The cloud filter acts as a first line of defense and keeps most unwanted email from making it to your network firewall. This decreases your vulnerability to inbound threats and saves system bandwidth and storage. ProSight Email Guard's on-premises security gateway device adds a further level of analysis for incoming email. For outbound email, the on-premises security gateway offers AV and anti-spam filtering, protection against data leaks, and encryption. The onsite gateway can also assist Microsoft Exchange Server to monitor and protect internal email that originates and ends within your corporate firewall. Find out more about Progent's ProSight Email Guard Spam Filtering, Virus Defense, Content Filtering and Data Loss Prevention.

ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection service that utilizes next generation behavior machine learning tools to defend endpoints and physical and virtual servers against new malware assaults such as ransomware and file-less exploits, which routinely evade traditional signature-based anti-virus products. ProSight Active Security Monitoring protects local and cloud-based resources and provides a single platform to manage the entire malware attack lifecycle including filtering, infiltration detection, mitigation, cleanup, and post-attack forensics. Key capabilities include one-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against newly discovered attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) Endpoint Protection and Ransomware Defense.

ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services provide small and medium-sized organizations a low cost end-to-end solution for secure backup/disaster recovery (BDR). For a fixed monthly rate, ProSight Data Protection Services automates and monitors your backup processes and enables rapid recovery of critical files, apps and VMs that have become lost or corrupted as a result of hardware failures, software bugs, disasters, human error, or malware attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local storage device, or to both. Progent's backup and recovery consultants can deliver world-class expertise to set up ProSight Data Protection Services to be compliant with government and industry regulatory requirements like HIPPA, FIRPA, PCI and Safe Harbor and, whenever necessary, can assist you to restore your business-critical data. Find out more about ProSight Data Protection Services Managed Cloud Backup.

Expert Network Security Planning
Every company ought to develop a carefully thought out security strategy that includes both preventive procedures and reaction plans. The pre-attack plan is a collection of mechanisms intended to reduce security weaknesses. The reactive plan assists your company's IT security engineers to evaluate the impact resulting from an attack, fix the system, record the experience, and get business functions restored as soon as possible.

Progent's certified IS security consultants can to help your company to perform a full risk assessment and create a network security plan to implement security policies and mechanisms to mitigate ongoing assaults and dangers.

CISM Certified System Security Consulting Expertise
The Certified Information Security Manager (CISM) committee defines the basic competencies and global standards of skill that information security managers are expected to learn. It provides executive management the assurance that consultants who have earned their CISM credential have the background and capability to deliver efficient security management and consulting services. Progent offers the services of CISM certified security consultants to assist businesses with:

  • IS Security Processes
  • Risk Analysis
  • Network Security Implementation Management
  • IS Security Administration
  • Response Planning
Find out more information concerning Progent's CISM Accredited Network Security Engineering Expertise.

CISSP Certified Security Consulting Support
The CISSP credential recognizes mastery of a global standard for data security. ANSI has granted certification accreditation in the field of data protection stipulated by ISO 17024. Progent can provide access to of security consultants who have earned CISSP accreditation. Progent can provide a CISSP-certified consultant to help your organization in a broad range of security fields such as:

  • Security Administration Procedures
  • Security Infrastructure and Models
  • Access Management Systems and Methodology
  • Applications Development Security
  • Secure Operations
  • Site Security
  • Encryption/Decryption Technology
  • Telecom, LAN and WAN Security
  • Disaster Recovery Preparedness
Read more details about Progent's CISSP Qualified IS Security Consulting Services.

ISSAP Accredited Secure Network Architecture Engineering Support
Progent's ISSAP qualified network architecture professionals are experts who have been awarded ISSAP Certification as a result of thorough testing and significant work with network security design. The Information System Security Architecture Professional (ISSAP) credential indicates demonstrated mastery in the most in-depth demands of IS security architecture within the broader scope of information security knowledge required for CISSP accreditation. Progent's ISSAP-qualified security consultants can assist your company with all phases of secure network architecture including.

  • Access Management Systems and Techniques
  • Phone System and Network Infrastructure Security
  • Data Encryption Options
  • Needs Evaluation and Security Standards
  • BCP and Disaster Recovery Planning
  • Hardware Security
Find out more details concerning Progent's ISSAP Certified Secure System Architecture Support Services.

CISA Certified IS Security Auditing Consulting Support
The Certified Information Systems Auditor accreditation is a globally recognized achievement that indicates expertise in IS security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA credential requires that candidates pass an extensive test given by the ISACA professional association. Progent's CISA-certified IS security audit consultants are available to assist your IT organization in the areas of:

  • Information Systems Audit Services
  • IT Governance
  • Systems and Architecture Lifecycle
  • Information Technology Service Delivery
  • Protecting Information Assets
  • Disaster Recovery Planning
Learn additional details concerning Progent's CISA Qualified Network Security Auditing Consulting Assistance.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC program was initiated by ISACA to verify an IT professional's ability to design, implement, and maintain IS control mechanisms to reduce network risk. Progent can provide the expertise of a CRISC-certified consultant to assist your company to develop and execute a business continuity or disaster recovery strategy based on industry best practices identified by CRISC and crafted to match your organization's risk tolerance, business goals, and IT budget. Progent's CRISC-certified IT risk management specialists offer a variety of risk evaluation services including:

  • Gather information and review documentation to evaluate major vulnerabilities
  • Identify legal, regulatory, and contractual mandates and organizational policies associated with your network to assess their potential influence on your strategic objectives
  • Identify possible threats for your business processes to assist in evaluating your corporate risk
  • Develop a risk awareness initiative and conduct seminars to ensure your organization understand IS risk so they can assist with your risk management process
  • Match identified risk scenarios to related business processes to help determine risk ownership
  • Determine risk tolerance with your senior management and major stakeholders to ensure they are in agreement
Get the details concerning Progent's CRISC Experts.

GIAC Qualified IS Security Consulting Services
Global Information Assurance Certification was established in 1999 to validate the skill of IT security experts. GIAC's mission is to make sure that a certified security consultant possesses the knowledge necessary to deliver services in vital areas of system, information, and program security. GIAC certifications are acknowledged by businesses and institutions around the world including and the United States National Security Agency (NSA). Progent's GIAC security audit engineers are available to help your company in the areas of:

  • Auditing Perimeters
  • Security Incident Response
  • Traffic Analysis
  • Web-based Services Security
  • SIEM solutions
Find out more information about Progent's GIAC Information Assurance Expertise.

Talk to a Certified Security Expert
To see how you can access a Progent security consultant for online or on-premises assistance in Arizona, call 1-800-993-9400 or visit Remote Computer Help.














© 2002- 2018 Progent Corporation. All rights reserved.