Small business networks in the state of Arizona can have fast and affordable online help from Progent's qualified security experts to resolve critical security problems. The cost is affordable, billing is per minute, engagement is fast, and service is world class. Progent also offers help for complex projects that demand the services of senior security engineers with top industry credentials.

In case your Arizona network is situated some distance from more populated metropolitan neighborhoods such as Phoenix, Tucson, Mesa, or Glendale, help from nearby accredited security support specialists is often limited when you have an emergency. This can result in lost income for your company, upset clients, unproductive workers, and defocused executives. By calling Progent's remote support, you have access to a certified security consultant ready to deliver help when you require it to get your computer network on line and salvage your information.

Progent can help you in all your initiatives to protect your network with support that ranges from security assessments to creating a comprehensive security strategy. Progent offers affordable support to assist businesses of all sizes to design and maintain secure networks based on Microsoft Windows and Cisco products and that can include computers based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as BYOD users with Apple iOS handhelds or Android or Windows Phone handsets.

Progent can also assist you to outsource spam filtering and protection from e-mail-based attacks. Email Guard is Progent's email security solution that uses the services and infrastructure of leading information security vendors to provide web-based management and comprehensive security for your email traffic. The hybrid architecture of Progent's Email Guard integrates a Cloud Protection Layer with an on-premises gateway device to offer complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The cloud filter serves as a preliminary barricade and keeps most threats from reaching your network firewall. This reduces your vulnerability to external threats and conserves network bandwidth and storage. ProSight Email Guard's on-premises security gateway device provides a deeper level of analysis for inbound email. For outbound email, the on-premises gateway provides anti-virus and anti-spam protection, DLP, and encryption. The local gateway can also enable Microsoft Exchange Server to track and protect internal email that stays inside your corporate firewall.

Progent's certified engineers are accessible online or on premises to offer a range of urgent or longer-term computer security services including:

  • Run extensive network security audits
  • Recuperate rapidly after serious security breaches
  • Set up and troubleshoot firewalls
  • Implement secure methods for offsite and mobile connectivity
  • Install advanced utilities for automatic protection against spam and DHAs
  • Develop a company-wide security strategy with proactive network monitoring
  • Offer outsourced Call Center Support
  • Help Create an effective network backup and restore solution built around Data Protection Manager backup technology
If your business has an emergency requirement for IT security support, go to Progent's Urgent Remote Network Help.

Progent's support professionals can deliver world-class support in key facets of system protection including security assessment, firewall and VPN expertise, and high-level security consulting.

Security Assessment
Progent's expert security engineers can assess the effectiveness of your existing computer security implementation through exhaustive remote automated testing via advanced software tools and tested techniques. Progent's experience in administering this service saves you time and money and assures a detailed picture of gaps. The information your IT organization is provided can make up the foundation of a network protection plan that will permit your information system to operate dependably and adapt quickly to new threats.

Automated Vulnerability Analysis
Progent provides consulting in the application of security auditing software including Microsoft's MBSA and GFI LANguard for economically running a set of programmed system testing checks to identify possible security holes. Progent has broad experience with additional network analysis tools such as NMAP, AMAP, eEye, plus tools such as SolarWinds, Netcat, Socat, and Nikto. Progent can help you to understand testing reports and react appropriately.

Progent can help you build protection into your business operations, configure scanning applications, plan and deploy a protected system environment, and recommend procedures to maximize the security of your network. Progent's security engineers are able to assist you to configure a firewall, implement secure remote access to email and data, and install VPN. Find out more about Progent's automated security evaluation.

Security Inventory Service Packages for Small Businesses
Progent offers two ultra-affordable security inventory service packages designed to allow small businesses to receive an objective security evaluation from an accredited security expert. With Progent's External Network Security Inventory Scan, a security expert administers a comprehensive test of your IT infrastructure from outside your firewall to determine potential weaknesses in the security posture you expose to the public. With Progent's Internal Network Security Inventory Checkup, a security engineer runs a system scan from an authorized machine inside your firewall to uncover the risk to inside attacks. The two security inventory packages are set up and executed from a secured external location. The process is directed by an engineer with high-level security accreditations and who produces a report that summarizes and analyzes the information collected by the scan and suggests practical improvements where called for.

Network Penetration Testing Consulting
Stealth intrusion testing is an important part of any serious network security strategy. Progentís security professionals can perform thorough penetration checks without the awareness of your organization's internal network support staff. Unannounced penetration checking uncovers whether existing security monitoring tools such as intrusion incident alerts and event log monitoring are properly configured and actively monitored. Find out additional information on Progent's network penetration analysis consulting.

Firewall/VPN Expertise
Progent's expertise in network security technology encompasses in-depth field work with leading firewalls and VPN technology offered by a variety of companies including Cisco, Microsoft, and Juniper. Progent can provide the services of engineers with key networking certifications such as CCIE and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Integration and Debugging
The current ASA 5500-X Family of firewalls with Firepower Services offer substantially more bang for the buck than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX firewalls for new deployments. Since Cisco's acquisition of Sourcefire, the whole family of Cisco ASA 5500-X firewalls can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular network intrusion protection system (IPS). Firepower services provide enhanced capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can help you to manage your current PIX or ASA 5500 firewalls and upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your company to plan, deploy, optimize, administer and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Find out more information about ASA Firewalls with Firepower configuration and debugging services.

Cisco Network Security and Virtual Private Network Consulting Services
Cisco's network security and remote access products provide a comprehensive range of manageable security products to help safeguard your wired and wireless network infrastructure. Cisco's VPN product family includes routers, firewalls, intrusion detection devices and VPN concentrators. Progent's expert staff of consultants includes experienced specialists with Cisco's Certified Internetwork Expert and CCNP qualifications who can assist your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that fit most closely with your company goals. Read more information concerning Progent's Support Services for Cisco Security Technology and Virtual Private Network Appliances.

Consulting Expertise for Additional Firewall and VPN Technology
Progent provides small and medium size companies professional consulting for Intrusion Protection Systems and IPsec VPN products from major firewall and VPN security companies including Check Point Software, Juniper, and Symantec. Progent can help you design a comprehensive security plan and choose appropriate technologies from multiple suppliers to support your security goals while staying within your budget restraints.

Progent's Low-Cost Managed Services for Information Security
Progent's value-priced ProSight line of outsourced network management services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection solution that utilizes cutting edge behavior machine learning tools to defend endpoints as well as physical and virtual servers against new malware attacks like ransomware and file-less exploits, which easily evade legacy signature-based anti-virus products. ProSight Active Security Monitoring protects local and cloud resources and provides a unified platform to automate the entire malware attack lifecycle including blocking, infiltration detection, containment, remediation, and forensics. Top features include one-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection (ESP) services deliver economical multi-layer protection for physical servers and VMs, desktops, mobile devices, and Microsoft Exchange. ProSight ESP uses adaptive security and advanced machine learning for continuously monitoring and reacting to security assaults from all vectors. ProSight ESP provides two-way firewall protection, penetration alerts, endpoint control, and web filtering through leading-edge tools packaged within a single agent managed from a single console. Progent's data protection and virtualization consultants can help you to plan and implement a ProSight ESP environment that meets your organization's unique requirements and that helps you prove compliance with legal and industry data protection regulations. Progent will help you define and implement security policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alerts that call for urgent attention. Progent's consultants can also help you to install and verify a backup and disaster recovery solution like ProSight Data Protection Services (DPS) so you can get back in business quickly from a potentially disastrous cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Exchange filtering.

ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services offer small and mid-sized businesses a low cost and fully managed service for reliable backup/disaster recovery (BDR). Available at a fixed monthly price, ProSight Data Protection Services automates your backup activities and enables rapid recovery of vital files, apps and virtual machines that have become lost or corrupted due to hardware failures, software glitches, disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to an on-promises storage device, or mirrored to both. Progent's cloud backup consultants can deliver advanced support to set up ProSight Data Protection Services to to comply with government and industry regulatory requirements like HIPPA, FINRA, and PCI and, when necessary, can assist you to restore your business-critical data. Read more about ProSight Data Protection Services Managed Backup and Recovery.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the technology of leading data security vendors to deliver web-based control and world-class protection for all your email traffic. The powerful structure of Email Guard managed service integrates cloud-based filtering with an on-premises security gateway appliance to provide complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The cloud filter acts as a preliminary barricade and keeps most unwanted email from reaching your security perimeter. This reduces your exposure to inbound attacks and saves network bandwidth and storage space. Email Guard's on-premises security gateway appliance adds a further layer of analysis for incoming email. For outbound email, the onsite gateway offers anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The on-premises security gateway can also help Microsoft Exchange Server to monitor and protect internal email traffic that originates and ends within your security perimeter. For more details, visit Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and applications hosted in a secure fault tolerant data center on a high-performance virtual host set up and maintained by Progent's network support experts. With Progent's ProSight Virtual Hosting model, the customer retains ownership of the data, the OS platforms, and the applications. Because the system is virtualized, it can be moved immediately to a different hardware environment without requiring a lengthy and difficult configuration process. With ProSight Virtual Hosting, you are not tied a single hosting service. Find out more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, maintain, retrieve and protect information about your IT infrastructure, procedures, applications, and services. You can quickly locate passwords or IP addresses and be alerted automatically about upcoming expirations of SSLs or domains. By updating and managing your network documentation, you can eliminate up to half of time spent searching for critical information about your network. ProSight IT Asset Management features a centralized location for storing and sharing all documents required for managing your network infrastructure such as standard operating procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for gathering and relating IT information. Whether youíre making improvements, performing regular maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the information you require as soon as you need it. Find out more about Progent's ProSight IT Asset Management service.

Expert Network Security Design
Any business ought to have a carefully thought out security program that incorporates both pre-attack procedures and response planning. The pre-attack strategy is a set of procedures intended to reduce security weaknesses. The reactive plan assists your company's IT security engineers to evaluate the impact resulting from an attack, repair the network, record the event, and get business functions running as quickly as feasible.

Progent's certified IT security consultants are available to assist your company to run a full risk assessment and define a network security plan to establish security policies and mechanisms to reduce future assaults and threats.

CISM Certified Network Security Support Assistance
The Certified Information Security Manager (CISM) committee describes the basic capabilities and global standards of performance that IT security professionals are expected to master. CISM provides business management the confidence that consultants who have qualified for their CISM certification have the experience and capability to deliver efficient security management and support consulting. Progent can provide the expertise of CISM certified security consultants to assist businesses with:

  • Information Security Processes
  • Risk Analysis
  • IS Security Implementation Management
  • Information Security Administration
  • Response Management
Read additional details about Progent's CISM Qualified Network Security Engineering Professionals.

CISSP Qualified Security Engineering Support
The CISSP credential recognizes expertise with a worldwide standard for information security. ANSI (American National Standards Institute) has granted certification accreditation in the field of data protection under ISO/IEC 17024. Progent can provide access to of security professionals who have earned CISSP accreditation. Progent can give you access to a CISSP-certified professional to help your organization in a broad range of security fields such as:

  • Security Management Procedures
  • Security Infrastructure and Models
  • Access Management Solutions and Methodology
  • Software Development Security
  • Operations Security
  • Physical Security
  • Data Encryption Mechanisms
  • Telecommunications, Network and Internet Security
  • Disaster Recovery Preparedness
Find out more information concerning Progent's CISSP Security Consulting Professionals.

ISSAP Qualified Secure Network Architecture Engineering Assistance
Progent's ISSAP qualified system architecture professionals are experts who have earned ISSAP Certification through rigorous examination and significant experience with information security design. The ISSAP certification indicates proven mastery in the most challenging demands of information security architecture within the wider scope of information system security knowledge needed for CISSP certification. Progent's ISSAP-certified security specialists can help your company with all aspects of architecture security including.

  • Access Control Mechanisms and Methodologies
  • Telecommunications and System Infrastructure Security
  • Encryption/Decryption Solutions
  • Requirements Analysis and Security Standards
  • BCP and Disaster Recovery Planning
  • Site Security
Read more information about Progent's ISSAP Certified Secure System Architecture Consulting Expertise.

CISA Certified Information System Security Auditing Consulting Expertise
The Certified Information Systems Auditor (CISA) accreditation is a recognized qualification that indicates mastery in IS security audit and control. Certified by ANSI, the CISA credential requires that candidates pass an extensive examination administered by the ISACA international professional group. Progent's CISA-certified network security audit engineers are available to assist your company in the areas of:

  • Information Systems Audit Services
  • IT Governance
  • Systems and Architecture Planned Useful Life
  • IT Service Delivery
  • Safeguarding Data Assets
  • Disaster Recovery Planning
Learn more details concerning Progent's CISA Qualified Information System Security Auditing Engineering Expertise.

CRISC Experts
The CRISC certification program was established by ISACA in 2010 to validate a consultant's ability to design, implement, and maintain IS controls to reduce risk. Progent offers the expertise of a CRISC-certified engineer to help your company to create and execute a business continuity strategy based on industry best practices promoted by CRISC and crafted to match your organization's risk appetite, business goals, and budgetary guidelines. Progent's CRISC-qualified network risk mitigation experts offer a variety of risk identification services such as:

  • Gather information and study documentation to help identify major risk scenarios
  • Identify legal, industry, and business mandates and organizational standards associated with your network to assess their possible influence on your strategic goals
  • Identify possible vulnerabilities for your business workflows to assist in evaluating your enterprise risk
  • Create a risk awareness initiative and conduct seminars to make sure your organization understand IT risk so they can assist with your risk management process
  • Match key risk vectors to your associated business processes to help assign risk responsibility
  • Determine risk appetite with executive management and key stakeholders to ensure they match
Find out additional details concerning Progent's CRISC Consultants.

GIAC Qualified Security Consulting Expertise
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the skill of information technology security experts. GIAC's mission is to ensure that an accredited security consultant has the knowledge appropriate to deliver services in vital areas of network, data, and application security. GIAC certifications are acknowledged by businesses and government organizations all over the world including and the United States National Security Agency. Progent's GIAC network security audit specialists are available to help your IT organization with:

Learn additional details concerning Progent's GIAC Information Assurance Expertise.

Talk to a Progent Security Engineer
To learn how you can contact a certified security engineer for online or on-premises expertise in Arizona, call 1-800-993-9400 or go to Online Network Support.

© 2002- 2018 Progent Corporation. All rights reserved.