Small business information networks in the state of Arizona now have prompt and affordable online technical support from Progent's certified security professionals to fix urgent security problems. Rates are affordable, billing is per minute, engagement is immediate, and support is world class. Progent also provides help for complex engagements that requires the knowledge of seasoned security engineers with high-level industry certifications.

In case your Arizona office is located outside of more populated urban neighborhoods like Phoenix, Tucson, Mesa, or Glendale, contact with local qualified network security consultants may be limited when you have an emergency. This can result in lost income for your business, upset clients, unproductive workers, and distracted management. By contacting Progent, you have access to a certified security professional who can provide assistance when you require it to keep your system on line and restore your data.

Progent can help you in all your initiatives to guard your IT environment with support services that can range from security checks to developing a comprehensive security plan. Progent provides affordable service to help businesses of all sizes to configure and maintain protected networks based on Windows and Cisco technology and that may include servers and desktops running UNIX or Linux platforms plus mobile users with Apple iOS iPhones and iPads or Google Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam filtering and defense against e-mail-based attacks. Email Guard is Progent's email security platform that incorporates the technology of leading information security companies to provide web-based management and comprehensive protection for all your inbound and outbound email. The hybrid architecture of Email Guard managed service integrates a Cloud Protection Layer with an on-premises security gateway device to offer complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. ProSight Email Guard's Cloud Protection Layer serves as a first line of defense and keeps the vast majority of threats from making it to your security perimeter. This reduces your exposure to inbound attacks and conserves network bandwidth and storage space. ProSight Email Guard's on-premises gateway appliance adds a further layer of inspection for incoming email. For outgoing email, the on-premises gateway offers anti-virus and anti-spam protection, DLP, and email encryption. The local security gateway can also enable Exchange Server to track and protect internal email that stays inside your security perimeter.

Progent's certified professionals are accessible remotely or in person to offer a range of urgent or project-based network security services including:

If your network has an emergency need for IT security support, refer to Progent's Urgent Online Network Help.

Progent's support professionals offer advanced services in key fields of network security including analysis, firewalls and VPN, and high-level security planning.

Security Evaluation
Progent's expert security engineers can assess the strength of your existing network protection implementation by performing comprehensive remote automated analysis via sophisticated utilities and tested techniques. Progent's experience in administering this testing saves your company time and money and assures an accurate picture of security holes. The knowledge your company gains can be used as the foundation of a security strategy that will permit your network to operate dependably and respond quickly to new risks.

Automated Network Vulnerability Evaluation
Progent provides consulting in the use of security evaluation packages such as MBSA and LANguard from GFI for affordably running a variety of automatic system testing checks to uncover potential security holes. Progent has broad experience with additional security analysis utilities such as NMAP Port Scanner, AMAP, eEye Vulnerability Scanner, plus utilities such as Metasploit Framework, Netcat, and Nikto. Progent can show you how to understand testing reports and react effectively.

Progent can show you how to design protection into your business processes, install scanning applications, define and implement a protected system environment, and recommend procedures to maximize the security of your network. Progent's security engineers are ready to show you how to set up a firewall, design safe remote access to email and data, and integrate VPN. Find out additional information about Progent's network security analysis.

Security Inventory Bundles for Small Companies
Progent has put together two ultra-affordable security inventory packages designed to allow small companies to receive an impartial network security evaluation from a certified security expert. With Progent's External Security Inventory Scan, a security expert runs a comprehensive examination of your IT infrastructure from outside your firewall to uncover possible risks in the security posture you present to the public. With Progent's Internal Security Inventory Checkup, a security engineer executes a network scan from an authorized computer within your firewall to uncover the risk to inside attacks. The two security inventory packages are configured and run from a secured remote location. The project is managed by an engineer with high-level security credentials and who produces a document that details and analyzes the information captured by the security scan and suggests practical improvements if called for.

Network Penetration Analysis Consulting
Stealth intrusion testing is a key part of any serious IT system security strategy. Progent’s security experts can perform thorough intrusion tests without the knowledge of your organization's in-house network support resources. Unannounced penetration testing shows whether existing security monitoring systems such as intrusion detection warnings and event history analysis are properly set up and consistently checked. Find out more concerning Progent's network penetration testing support services.

Firewall And Virtual Private Network (VPN) Expertise
Progent's expertise in network security solutions includes in-depth familiarity with major firewalls and Virtual Private Network (VPN) products from a variety of companies including Cisco, Microsoft, and CheckPoint. Progent can provide the support of engineers who have earned key industry accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Integration and Troubleshooting
The latest generation of Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide substantially more performance than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new installations. Since Cisco's acquisition of Sourcefire, the whole family of Cisco ASA 5500-X devices can be configured to enable Firepower Services, built on Sourcefire's Snort product, which is the world's most deployed intrusion protection system. Firepower services bring enhanced features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can help your company to maintain your existing PIX or ASA 5500 firewalls or upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite help with ASA 5500-X firewalls with Firepower Services and can assist you to plan, configure, tune, administer and troubleshoot firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Read more information about ASA 5500-X Firewalls with Firepower Services configuration and troubleshooting services.

Cisco Security and Virtual Private Network Engineering Services
Cisco's network security and remote connection products represent a comprehensive line of easy-to-administer security solutions to help protect your local and remote information system. Cisco's Virtual Private Network line includes routers, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's professional staff of consultants includes experienced engineers with Cisco's Certified Internetwork Expert and CCNP qualifications who can help your company to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that fit most closely with your company objectives. Find out additional information concerning Progent's Support Expertise for Cisco Security Technology and Virtual Private Network Products.

Engineering Services for Other Firewall and Virtual Private Network Products
Progent offers small and mid-size businesses professional consulting for Intrusion Protection products and IPsec VPN products from leading firewall and Virtual Private Network security vendors including WatchGuard, Juniper Networks, and Symantec. Progent can help you create a detailed security plan and select the right products from a variety of suppliers to support your security objectives while sticking within your spending limits.

Progent's Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight line of network monitoring and management services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection solution that incorporates next generation behavior machine learning tools to defend endpoint devices as well as physical and virtual servers against modern malware assaults like ransomware and file-less exploits, which easily evade legacy signature-based AV products. ProSight Active Security Monitoring safeguards on-premises and cloud resources and provides a single platform to address the entire malware attack lifecycle including blocking, detection, containment, remediation, and post-attack forensics. Key capabilities include one-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection: Unified Endpoint Security
ProSight Enhanced Security Protection (ESP) managed services deliver affordable multi-layer security for physical and virtual servers, desktops, smartphones, and Microsoft Exchange. ProSight ESP utilizes contextual security and modern behavior analysis for round-the-clock monitoring and reacting to cyber assaults from all vectors. ProSight ESP delivers firewall protection, penetration alarms, device control, and web filtering via cutting-edge technologies incorporated within one agent accessible from a single console. Progent's security and virtualization experts can assist you to plan and configure a ProSight ESP deployment that addresses your company's unique requirements and that allows you prove compliance with legal and industry information protection regulations. Progent will help you specify and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alerts that require immediate attention. Progent's consultants can also help your company to set up and verify a backup and restore solution like ProSight Data Protection Services (DPS) so you can recover rapidly from a destructive cyber attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Microsoft Exchange filtering.

ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services offer small and medium-sized businesses a low cost and fully managed solution for reliable backup/disaster recovery (BDR). Available at a fixed monthly rate, ProSight DPS automates and monitors your backup processes and allows rapid recovery of critical files, apps and virtual machines that have become lost or corrupted due to component breakdowns, software bugs, disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to an on-promises device, or mirrored to both. Progent's backup and recovery consultants can provide world-class expertise to configure ProSight DPS to to comply with government and industry regulatory standards such as HIPPA, FIRPA, PCI and Safe Harbor and, whenever needed, can assist you to restore your critical information. Learn more about ProSight Data Protection Services Managed Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that uses the technology of top information security vendors to deliver web-based management and world-class protection for your email traffic. The hybrid structure of Progent's Email Guard managed service combines cloud-based filtering with an on-premises gateway device to provide advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. Email Guard's cloud filter acts as a preliminary barricade and keeps most threats from reaching your network firewall. This decreases your exposure to external attacks and saves system bandwidth and storage space. Email Guard's on-premises gateway appliance adds a deeper level of inspection for inbound email. For outgoing email, the onsite gateway provides AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite gateway can also help Exchange Server to track and safeguard internal email traffic that originates and ends within your security perimeter. For more details, visit ProSight Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its key servers and apps hosted in a secure fault tolerant data center on a fast virtual machine host set up and maintained by Progent's IT support professionals. Under Progent's ProSight Virtual Hosting model, the customer retains ownership of the data, the OS platforms, and the apps. Since the environment is virtualized, it can be ported easily to a different hardware solution without a lengthy and technically risky reinstallation process. With ProSight Virtual Hosting, you are not locked into a single hosting service. Learn more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, retrieve and protect data about your IT infrastructure, processes, applications, and services. You can instantly find passwords or serial numbers and be alerted about impending expirations of SSLs ,domains or warranties. By cleaning up and organizing your IT infrastructure documentation, you can save up to 50% of time wasted trying to find vital information about your network. ProSight IT Asset Management includes a centralized repository for holding and collaborating on all documents required for managing your business network such as standard operating procedures and self-service instructions. ProSight IT Asset Management also supports a high level of automation for collecting and relating IT data. Whether you’re making improvements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the data you need when you need it. Learn more about Progent's ProSight IT Asset Management service.

Certified Security Consulting
Any company ought to develop a thoroughly thought out security strategy that includes both proactive processes and response planning. The pre-attack plan is a set of mechanisms that help to minimize security weaknesses. The reactive plan helps your company's network security personnel to assess the damage caused by a security penetration, fix the network, record the experience, and get business functions running as rapidly as feasible.

Progent's expert information security engineers are available to assist you to perform a comprehensive vulnerability evaluation and define a company-wide security strategy to establish security policies and controls to mitigate ongoing assaults and dangers.

CISM Accredited Security Support Assistance
The Certified Information Security Manager (CISM) organization defines the core competencies and international standards of performance that information security managers are required to learn. It provides business management the assurance that consultants who have qualified for their CISM certification have the experience and knowledge to provide effective security management and support services. Progent offers the support of CISM certified security consultants to assist companies with:

  • Information Security Processes
  • Risk Analysis
  • IS Security Implementation Management
  • Information Security Administration
  • Recovery Management
Learn additional information concerning Progent's CISM Accredited IS Security Consulting Services.

CISSP Certified Security Consulting Assistance
CISSP recognizes expertise with a global standard for network security. The American National Standards Institute has awarded certification recognition in the area of information security under ISO/IEC 17024. Progent can provide the services of security consultants who have earned CISSP certification. Progent can provide a CISSP-certified consultant to help your business in a broad range of security fields such as:

  • Security Administration Practices
  • Security Architecture and Models
  • Access Management Systems and Processes
  • Software Development Security
  • Secure Operations
  • Site Security
  • Data Encryption Mechanisms
  • Telecommunications, LAN and WAN Security
  • Business Continuity Planning
Learn more details about Progent's CISSP Qualified Information Security Engineering Expertise.

ISSAP Certified Secure IT Architecture Consulting Expertise
Progent's ISSAP qualified system architecture engineers are experts who have earned ISSAP Certification through thorough examination and significant experience with information security design. The ISSAP certification represents proven competence in the most challenging requirements of IS security architecture within the wider field of information security expertise needed for CISSP accreditation. Progent's ISSAP-qualified security specialists can assist your company with all phases of architecture security such as.

  • Access Control Mechanisms and Methodologies
  • Telecom and Network Protection
  • Data Encryption Options
  • Needs Evaluation and Security Guidelines
  • Business Continuity Planning and Disaster Recovery Planning
  • Physical Security
Read additional information concerning Progent's ISSAP Qualified Secure Information System Architecture Engineering Services.

CISA Qualified Network Security Auditing Consulting Services
The Certified Information Systems Auditor credential is a prestigious achievement that indicates mastery in network security audit and control. Accredited by the American National Standards Institute, the CISA credential has consultants undergo an extensive examination given by the ISACA professional association. Progent's CISA-qualified security audit engineers can assist your company with:

  • IS Audit Process
  • IT Governance
  • Systems and Architecture Lifecycle Planning
  • IT Service Delivery
  • Safeguarding Data Assets
  • Business Continuity Planning
Learn additional information about Progent's CISA Qualified Information System Security Auditing Engineering Expertise.

Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC certification program was established by ISACA in 2010 to verify an IT professional's skills to design, implement, and support information system controls to mitigate network risk. Progent offers the expertise of a CRISC-certified consultant to assist you to develop and carry out a business continuity strategy based on leading practices identified by CRISC and crafted to match your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC network risk mitigation engineers offer a range of risk assessment services including:

  • Collect information and study documentation to help identify significant vulnerabilities
  • Identify statutory, industry, and contractual requirements and company policies related to your information system to assess their potential influence on your business goals
  • Identify possible threats for your operational processes to help in evaluating your corporate risk
  • Create a risk awareness initiative and provide training to ensure your stakeholders appreciate IT risk so they can assist with your risk control program
  • Connect key risk vectors to related operational procedures to help determine risk responsibility
  • Validate risk appetite with your senior management and major stakeholders to ensure they match
Read more details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Certified Information System Security Engineering Services
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the knowledge of computer security experts. GIAC's mission is to make sure that an accredited professional has the knowledge needed to provide support in critical categories of network, information, and application software security. GIAC certifications are acknowledged by companies and government organizations throughout the world including and the United States National Security Agency. Progent's GIAC IS security audit consultants are available to help your business with:

  • Auditing Networks
  • Incident Handling
  • Traffic Analysis
  • Web-based Application Security
  • SIEM solutions
Find out additional details about Progent's GIAC Information Assurance Services.

Get in Touch with a Security Expert
To see how to access a certified security engineer for online or onsite assistance in Arizona, phone 1-800-993-9400 or visit Remote Network Help.














© 2002- 2018 Progent Corporation. All rights reserved.