Company networks in Arizona can depend on prompt and affordable online access to Progent's accredited network security consultants to assist with the toughest security problems. Rates are reasonable, charges are by the minute, sign-up is immediate, and service is world class. Progent also provides help for complex engagements that demand the services of senior security consultants with high-level industry certifications.

In case your Arizona organization is situated far from major urban neighborhoods such as Phoenix, Tucson, Mesa, or Glendale, contact with nearby certified security professionals is often problematic during an emergency. This could mean lost revenue for your company, upset customers, unproductive employees, and defocused management. By utilizing Progent's remote support, you can get in touch with a qualified security engineer who can provide help whenever you require it to get your system running and restore your information.

Progent can help you in your initiatives to protect your network with services that ranges from network security audits to developing a company-wide security strategy. Progent offers affordable support to assist companies of any size to configure and maintain protected IT environments powered by Microsoft Windows and Cisco products and that can include computers based on UNIX, Linux, Sun Solaris, or Mac OS X platforms plus BYOD clients with Apple iOS handhelds or Google Android or Windows Phone handsets.

Progent can also help you outsource spam blocking and protection from e-mail-based assaults. Email Guard is Progent's email security solution that incorporates the technology of top data security companies to deliver centralized control and world-class protection for all your inbound and outbound email. The powerful architecture of Email Guard managed service integrates cloud-based filtering with a local gateway device to provide complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based malware. The cloud filter acts as a preliminary barricade and blocks the vast majority of unwanted email from reaching your network firewall. This decreases your vulnerability to external attacks and conserves system bandwidth and storage space. Email Guard's on-premises security gateway device provides a deeper level of analysis for incoming email. For outbound email, the on-premises security gateway offers AV and anti-spam protection, DLP, and email encryption. The onsite gateway can also help Exchange Server to monitor and safeguard internal email traffic that stays within your security perimeter.

Progent's security consultants are accessible remotely or on site to provide a range of urgent or project-based network security services including:

If your company has an emergency need for computer security support, go to Progent's Urgent Online Technical Support.

Progent's engineers offer advanced support in key fields of network security including security evaluation, firewall and VPN expertise, and high-level security planning.

System Security Audits
Progent's expert security consultants can assess the vulnerability of your existing network protection implementation by performing exhaustive remote automated testing based on sophisticated utilities and tested procedures. Progent's experience in administering this service saves your company money and assures an accurate portrayal of system vulnerability. The knowledge your company is provided can form the foundation of a security strategy that can permit your network to run dependably and adapt rapidly to future threats.

Automated Vulnerability Audits
Progent offers expertise in the application of security analysis products including Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard NSS for affordably performing a variety of automatic network auditing scans to identify possible security vulnerabilities. Progent has extensive knowledge of additional network analysis products such as NMAP Port Scanner, AMAP, eEye, plus tools like SolarWinds, Netcat, Socat, and Nikto. Progent can show you how to understand audit reports and react effectively.

Progent can show you how to build security into your company operations, configure scanning software, plan and deploy a protected network architecture, and suggest policies to maximize the safety of your network. Progent's security professionals are able to assist you to set up a firewall, implement secure remote access to email and business applications, and integrate virtual private network. Find out more about Progent's network security audits.

Security Inventory and Evaluation Packages for Small Businesses
Progent has put together two low-cost security inventory and evaluation packages designed to allow small companies to receive an impartial network security evaluation from an accredited security expert. With Progent's External Network Security Inventory Checkup, a security engineer runs a comprehensive examination of your network from outside your firewall to determine possible weaknesses in the security profile you expose to the outside world. With Progent's Internal Security Inventory Checkup, a security engineer runs a system scan from a secure computer within your company firewall to uncover your exposure to inside threats. Both security inventory services are configured and executed from a secured external location. The project is directed by a consultant who has earned top security accreditations and who generates a report that details and analyzes the information collected by the security scan and proposes cost-effective improvements if called for.

Network Penetration Analysis Consulting
Stealth penetration checking is an important part of any successful IT system security plan. Progentís security experts can perform extensive intrusion checks without the knowledge of your company's internal IT resources. Stealth penetration testing uncovers whether current security monitoring systems such as intrusion detection warnings and event log analysis are properly configured and consistently monitored. Find out additional information on Progent's stealth penetration testing consulting.

Firewalls and VPN Solutions
Progent's background in security solutions includes in-depth familiarity with major firewalls and Virtual Private Network technology offered by a variety of vendors such as Cisco, Microsoft, and CheckPoint. Progent can provide the services of engineers who have earned key industry certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Configuration and Debugging
The new ASA 5500-X Series of firewalls with Firepower Services offer substantially more performance than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new deployments. Following Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X firewalls can be provisioned to enable Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular intrusion protection system. Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can assist your company to manage your current PIX or Cisco ASA 5500 firewalls or migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your company to plan, integrate, optimize, manage and debug firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. See more details about ASA 5500-X Firewalls with Firepower Services integration and debugging services.

Cisco Security and VPN Support Expertise
Cisco's network security and offsite access products represent a complete range of manageable security solutions to help protect your wired and wireless network infrastructure. Cisco's VPN line includes routers, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's expert staff of consultants includes experienced specialists with Cisco Certified Internetwork Expert and CCNP qualifications who can help your business to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that fit most closely with your company goals. Read more information about Progent's Engineering Services for Cisco Security and VPN Products.

Consulting Expertise for Other Firewall and Virtual Private Network Technology
Progent offers small and medium size companies professional consulting for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and VPN security vendors including Check Point Software, Juniper Networks, and Symantec. Progent can show you how to design a comprehensive security plan and choose the right products from a variety of suppliers to support your security goals while sticking within your budget restraints.

Progent's Fixed-price Managed Services for Information Assurance
Progent offers a portfolio of affordable, set-price monthly services designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. Managed services available from Progent include:
Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
Email Guard is Progent's email security platform that uses the technology of top data security companies to provide web-based management and world-class protection for all your inbound and outbound email. The hybrid structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with an on-premises security gateway device to offer complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. Email Guard's cloud filter serves as a first line of defense and blocks the vast majority of unwanted email from making it to your security perimeter. This reduces your vulnerability to inbound attacks and conserves system bandwidth and storage. Email Guard's onsite gateway device provides a deeper layer of inspection for inbound email. For outbound email, the onsite gateway offers anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The on-premises security gateway can also assist Exchange Server to track and safeguard internal email that originates and ends inside your security perimeter. Find out more about Progent's Email Guard Spam Filtering, Virus Blocking, Content Filtering and Data Loss Prevention.

ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that incorporates next generation behavior-based machine learning tools to guard endpoints and physical and virtual servers against modern malware assaults such as ransomware and file-less exploits, which easily escape traditional signature-based AV products. ProSight ASM safeguards on-premises and cloud resources and provides a single platform to automate the complete threat lifecycle including blocking, detection, mitigation, cleanup, and post-attack forensics. Key capabilities include one-click rollback with Windows VSS and automatic network-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring Endpoint Protection and Ransomware Defense.

ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services offer small and mid-sized businesses an affordable and fully managed service for secure backup/disaster recovery (BDR). Available at a low monthly rate, ProSight DPS automates your backup processes and allows rapid recovery of critical files, applications and virtual machines that have become lost or damaged due to component breakdowns, software bugs, natural disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, applications, system images, as well as Hyper-V and VMware images. Critical data can be backed up on the cloud, to a local device, or to both. Progent's backup and recovery specialists can provide advanced expertise to configure ProSight Data Protection Services to be compliant with government and industry regulatory standards such as IPPA, FIRPA, PCI and Safe Harbor and, when needed, can assist you to restore your critical information. Find out more about ProSight Data Protection Services Managed Cloud Backup and Recovery.

Certified Network Security Design
Any company ought to develop a thoroughly considered security strategy that incorporates both pre-attack processes and reaction planning. The proactive strategy is a collection of mechanisms that help to reduce security weaknesses. The reactive strategy assists your security engineers to assess the impact resulting from a security penetration, fix the system, record the experience, and get business functions running as rapidly as feasible.

Progent's expert IS security consultants can to assist your company to run a comprehensive risk assessment and create a company-wide security plan to implement security processes and controls to minimize ongoing attacks and threats.

CISM Accredited System Security Consulting Services
The Certified Information Security Manager (CISM) committee defines the basic competencies and global standards of skill that IT security managers are expected to master. CISM provides executive management the confidence that consultants who have earned their CISM credential have the experience and knowledge to deliver efficient security administration and consulting services. Progent offers the support of CISM certified security consultants to assist companies with:

  • Network Security Processes
  • Risk Management
  • Information Security Implementation Management
  • Information Security Management
  • Response Planning
Read additional details concerning Progent's CISM Security Consulting Expertise.

CISSP Certified Security Engineering Expertise
The CISSP credential recognizes expertise with an international standard for information security. The American National Standards Institute has awarded certification accreditation in the field of information security stipulated by ISO 17024. Progent offers access to of security consultants who have earned CISSP accreditation. Progent can give you access to a CISSP-certified professional to help your organization in a variety security fields such as:

  • Security Administration Practices
  • Security Infrastructure and Models
  • Access Management Solutions and Processes
  • Software Development Security
  • Operations Security
  • Site Security
  • Data Encryption Technology
  • Telecommunications, Network and Internet Security
  • Business Continuity Preparedness
Learn additional details about Progent's CISSP-certified Security Consulting Professionals.

ISSAP Qualified Secure Information System Architecture Engineering Services
Progent's ISSAP qualified information system architecture professionals are experts who have earned ISSAP Certification as a result of rigorous examination and significant work with network security design. The ISSAP credential indicates proven skill in the most challenging demands of information system security architecture within the wider field of information system security knowledge required for CISSP certification. Progent's ISSAP-certified security consultants can help your business with all phases of secure network architecture including.

  • Access Control Mechanisms and Techniques
  • Telecommunications and System Infrastructure Protection
  • Cryptography Options
  • Requirements Analysis and Security Standards
  • Business Continuity Planning and Disaster Recovery Planning (DRP)
  • Site Security
Find out more information about Progent's ISSAP Certified Secure Network Architecture Engineering Expertise.

CISA Certified Information System Security Auditing Engineering Assistance
The Certified Information Systems Auditor accreditation is a prestigious achievement that indicates expertise in network security auditing. Accredited by the American National Standards Institute (ANSI), the CISA credential has candidates undergo a comprehensive examination given by the ISACA international professional group. Progent's CISA-qualified IS security audit experts can assist your business with:

  • IS Audit Services
  • IT Governance
  • Network Assets and Infrastructure Planned Useful Life
  • IT Support
  • Safeguarding Information Resources
  • Business Continuity Preparedness
Get additional information about Progent's CISA Certified Security Auditing Engineering Services.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA to validate a consultant's ability to design, implement, and support information system controls to reduce risk. Progent can provide the expertise of a CRISC-certified engineer to assist you to develop and execute a workplace continuity or disaster recovery plan based on leading practices promoted by CRISC and geared to align with your company's risk appetite, business objectives, and IT budget. Progent's CRISC IT risk management consultants can provide a range of risk evaluation services including:

  • Collect data and review documentation to evaluate significant risk scenarios
  • Identify legal, industry, and contractual mandates and organizational standards related to your network to assess their possible impact on your strategic objectives
  • Point out potential threats for your business workflows to assist in evaluating your corporate risk
  • Create a risk awareness initiative and conduct training to make sure your organization understand information system risk so they can contribute to your risk control process
  • Connect key risk vectors to related business procedures to help determine risk ownership
  • Determine risk appetite with executive management and major stakeholders to make sure they align
Read more details about Progent's CRISC Consultants.

GIAC Certified IS Security Consulting Expertise
GIAC was established in 1999 to certify the knowledge of information technology security experts. GIAC's goal is to verify that a certified security consultant possesses the skills appropriate to deliver services in key categories of system, information, and application program security. GIAC accreditations are acknowledged by businesses and government organizations throughout the world including and the United States National Security Agency (NSA). Progent's GIAC-qualified information security audit experts are available to assist your IT organization in the areas of:

Read additional information concerning Progent's GIAC Information Assurance Expertise.

Contact a Progent Security Specialist
To see how you can contact a certified Progent security consultant for online or on-premises expertise in Arizona, phone 1-800-993-9400 or go to Remote Network Support.














© 2002- 2017 Progent Corporation. All rights reserved.