Company IT networks in Arizona can depend on quick and economical online help from Progent's qualified network security professionals to resolve critical security issues. Rates are reasonable, billing is per minute, sign-up is immediate, and support is unbeatable. Progent also offers assistance for complex projects that requires the services of seasoned security engineers with high-level security certifications.

If your Arizona network is situated outside of major urban areas like Phoenix, Tucson, Mesa, or Glendale, help from local certified network security professionals is often problematic when you have an emergency. This can cause a drop in productivity for your company, upset clients, idle employees, and distracted executives. By calling Progent's remote support, you can get in touch with a certified security professional ready to provide assistance when you require it to keep your network on line and restore your data.

Progent can help you in a variety of ways in your efforts to defend your information system with support that can range from security checks to developing a comprehensive security plan. Progent offers economical service to assist small and midsize companies to design and manage protected networks based on Windows and Cisco products and that may include servers and desktops running UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus mobile users with Apple iOS iPhones and iPads or Android or Windows Phone devices.

Progent can also help you outsource spam blocking and protection from email-borne assaults. Email Guard is Progent's email security platform that uses the technology of leading information security companies to deliver centralized management and comprehensive security for all your email traffic. The hybrid architecture of Progent's Email Guard managed service combines a Cloud Protection Layer with an on-premises security gateway appliance to offer advanced protection against spam, viruses, Dos Attacks, DHAs, and other email-based threats. The Cloud Protection Layer serves as a preliminary barricade and blocks the vast majority of unwanted email from reaching your network firewall. This reduces your exposure to external attacks and conserves system bandwidth and storage space. ProSight Email Guard's on-premises gateway device provides a deeper layer of inspection for incoming email. For outbound email, the onsite gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and encryption. The on-premises security gateway can also enable Microsoft Exchange Server to track and safeguard internal email that originates and ends within your corporate firewall.

Progent's certified professionals are accessible online or on premises to offer a range of emergency or project-based network security services such as:

If your company has an urgent need for IT security support, go to Progent's Urgent Online Network Help.

Progent's engineers provide world-class services in key areas of network security that include analysis, firewall and VPN solutions, and advanced security planning.

System Security Audits
Progent's certified security consultants can assess the strength of your current computer protection implementation through comprehensive remote automated analysis based on sophisticated utilities and tested techniques. Progent's skill in this testing saves your company consulting fees and assures an accurate portrayal of gaps. The knowledge your IT organization gains can be used as the foundation of a security plan that will permit your network to operate safely and adapt rapidly to new threats.

Automated Network Security Evaluation
Progent offers expertise in the use of security evaluation packages including Microsoft Baseline Security Analyzer (MBSA) and LANguard from GFI for economically running a set of programmed system auditing checks to identify possible security weaknesses. Progent has broad knowledge of other security auditing utilities such as NMAP Port Scanner, AMAP application mapper, eEye, plus utilities like Metasploit, Hydra, and Nikto. Progent can show you how to understand audit reports and react effectively.

Progent can help you design protection into your company processes, configure auditing software, plan and deploy a protected system architecture, and recommend policies to maximize the security of your network. Progent's security consultants are available to show you how to configure a firewall, implement secure remote access to email and data, and integrate virtual private network. Learn additional information about Progent's automated security evaluation.

Security Inventory and Evaluation Bundles for Small Businesses
Progent offers two low-cost security inventory packages designed to allow small companies to receive an impartial network security evaluation from an accredited security consultant. With Progent's External Security Inventory Scan, an engineer runs an extensive examination of your network from beyond your firewall to uncover potential weaknesses in the security posture you expose to the outside world. With Progent's Internal Network Security Inventory Scan, an engineer executes a network scan from an authorized machine inside your company firewall to determine your exposure to internal attacks. The two security inventory services are set up and run from a secured remote site. The process is directed by a consultant who has earned top security credentials and who produces a report that details and analyzes the data captured by the scan and suggests practical remediation where appropriate.

Network Security Penetration Analysis Support Services
Stealth penetration testing is a key part of any successful network security plan. Progent’s security experts can perform thorough penetration tests without the awareness of your organization's in-house network support staff. Stealth penetration checking shows whether current security monitoring tools such as intrusion detection warnings and event log analysis are properly configured and consistently monitored. Learn more concerning Progent's stealth penetration testing consulting.

Firewall/VPN Support
Progent's expertise in security technology includes extensive field work with major firewalls and Virtual Private Network products from a variety of vendors including Cisco, Microsoft, and Symantec. Progent offers the support of engineers with key industry accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Integration and Troubleshooting
The new Cisco ASA 5500-X Series of firewalls with Firepower Services deliver significantly more performance than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX firewalls for all new installations. Following Cisco's acquisition of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular network intrusion protection system. Firepower services bring powerful new capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can help you to manage your existing PIX or ASA 5500 firewalls or migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your company to design, deploy, tune, manage and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. See more information about Cisco ASA Firewalls with Firepower Services configuration and troubleshooting services.

Cisco Security and VPN Engineering Services
Cisco's security and remote access products offer a full range of manageable security products to help protect your wired and wireless network infrastructure. Cisco's VPN line includes routers, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's professional staff of consultants includes field-proven specialists with Cisco CCIE and Cisco Certified Network Professional qualifications who can assist your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that align best with your company goals. Read more information concerning Progent's Consulting Expertise for Cisco Security and VPN Appliances.

Consulting Expertise for Additional Firewall and Virtual Private Network Solutions
Progent provides small and medium size companies professional support for Intrusion Protection Systems and IPsec VPN technology from leading firewall and VPN security vendors such as Check Point Software, Juniper Networks, and SonicWALL. Progent can show you how to create a detailed security plan and select appropriate products from multiple suppliers to achieve your security goals while staying within your budget limits.

Progent's Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight family of outsourced network management services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that utilizes cutting edge behavior analysis technology to defend endpoints as well as servers and VMs against modern malware assaults such as ransomware and file-less exploits, which routinely evade traditional signature-based AV tools. ProSight ASM safeguards on-premises and cloud resources and offers a single platform to automate the entire malware attack lifecycle including filtering, identification, containment, remediation, and post-attack forensics. Key capabilities include single-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection (ESP) managed services offer affordable multi-layer protection for physical servers and VMs, desktops, mobile devices, and Exchange email. ProSight ESP utilizes contextual security and advanced heuristics for continuously monitoring and responding to cyber assaults from all vectors. ProSight ESP offers firewall protection, penetration alerts, endpoint management, and web filtering via cutting-edge tools packaged within one agent managed from a unified console. Progent's data protection and virtualization experts can assist your business to design and configure a ProSight ESP environment that meets your organization's unique requirements and that helps you demonstrate compliance with legal and industry data protection regulations. Progent will help you define and configure security policies that ProSight ESP will manage, and Progent will monitor your network and react to alerts that call for immediate action. Progent can also assist your company to set up and test a backup and restore system such as ProSight Data Protection Services so you can recover quickly from a destructive cyber attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Microsoft Exchange filtering.

ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services from Progent provide small and mid-sized organizations an affordable and fully managed solution for secure backup/disaster recovery (BDR). Available at a low monthly cost, ProSight Data Protection Services automates and monitors your backup activities and enables fast restoration of critical data, apps and VMs that have become unavailable or damaged due to hardware failures, software bugs, natural disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you protect, recover and restore files, folders, apps, system images, plus Hyper-V and VMware images. Important data can be protected on the cloud, to an on-promises storage device, or mirrored to both. Progent's BDR specialists can deliver world-class expertise to set up ProSight DPS to to comply with government and industry regulatory standards such as HIPPA, FIRPA, PCI and Safe Harbor and, when necessary, can help you to restore your business-critical information. Read more about ProSight Data Protection Services Managed Cloud Backup and Recovery.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the infrastructure of top information security companies to provide centralized management and comprehensive security for all your email traffic. The hybrid structure of Progent's Email Guard managed service combines a Cloud Protection Layer with an on-premises gateway device to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based malware. The cloud filter acts as a preliminary barricade and keeps most unwanted email from making it to your network firewall. This decreases your exposure to external threats and conserves system bandwidth and storage. Email Guard's onsite security gateway appliance adds a deeper layer of analysis for inbound email. For outgoing email, the on-premises security gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The onsite gateway can also help Microsoft Exchange Server to track and protect internal email traffic that stays inside your security perimeter. For more information, visit ProSight Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and applications hosted in a protected Tier III data center on a high-performance virtual machine host set up and maintained by Progent's IT support experts. Under the ProSight Virtual Hosting model, the client owns the data, the OS software, and the apps. Since the environment is virtualized, it can be moved easily to an alternate hosting environment without requiring a time-consuming and technically risky configuration process. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Learn more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, update, retrieve and protect data about your IT infrastructure, procedures, applications, and services. You can quickly find passwords or IP addresses and be alerted automatically about impending expirations of SSL certificates or warranties. By cleaning up and organizing your network documentation, you can save as much as 50% of time wasted trying to find vital information about your network. ProSight IT Asset Management includes a common repository for storing and sharing all documents related to managing your network infrastructure like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports a high level of automation for collecting and relating IT information. Whether you’re making improvements, doing maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the knowledge you need the instant you need it. Learn more about Progent's ProSight IT Asset Management service.

Expert Security Planning
Every company ought to develop a carefully thought out security program that incorporates both proactive procedures and response plans. The proactive plan is a set of mechanisms designed to minimize security weaknesses. The reactive plan assists your IT security personnel to evaluate the damage caused by a security penetration, fix the damage, document the event, and get business functions operational as soon as possible.

Progent's certified IT security engineers are available to assist you to perform a complete vulnerability assessment and create a company-wide security strategy to implement security processes and controls to reduce ongoing attacks and dangers.

CISM Certified Information Security Engineering Services
The CISM committee defines the basic capabilities and worldwide standards of skill that IT security professionals are required to learn. CISM gives executive management the assurance that those who have earned their CISM credential have the experience and knowledge to deliver efficient security management and consulting consulting. Progent can provide the support of CISM qualified security professionals to assist businesses with:

  • IS Security Governance
  • Vulnerability Analysis
  • Information Security Program Management
  • Network Security Administration
  • Recovery Management
Read additional information concerning Progent's CISM Accredited Security Consulting Expertise.

CISSP Qualified Security Consulting Assistance
The CISSP credential denotes expertise with a worldwide standard for data security. ANSI (American National Standards Institute) has awarded certification recognition in the field of data security defined by ISO 17024. Progent offers access to of security professionals who have qualified for CISSP certification. Progent can give you access to a CISSP-certified consultant to help your company in a broad range of security fields such as:

  • Security Management Practices
  • Security Infrastructure and Models
  • Access Management Solutions and Processes
  • Software Development Security
  • Secure Operations
  • Physical Security
  • Cryptography Technology
  • Telecom, LAN and WAN Security
  • Disaster Recovery Planning
Learn additional information concerning Progent's CISSP Qualified Information Security Consulting Expertise.

CISSP-ISSAP Certified Secure Network Architecture Consulting Support
Progent's CISSP-ISSAP qualified network architecture engineers are experts who have been awarded ISSAP status through rigorous examination and extensive experience with information security design. The ISSAP credential represents proven competence in the most in-depth requirements of information security architecture bounded by the wider field of information system security knowledge required for CISSP certification. Progent's ISSAP-certified security consultants can help your company with all phases of secure network architecture including.

  • Access Control Mechanisms and Methodologies
  • Telecommunications and Network Infrastructure Protection
  • Data Encryption Solutions
  • Needs Analysis and Security Guidelines
  • Business Continuity Planning and Disaster Recovery Planning
  • Site Security
Learn additional information concerning Progent's ISSAP Certified Secure Information System Architecture Consulting Services.

CISA Certified IS Security Auditing Engineering Assistance
The Certified Information Systems Auditor accreditation is a prestigious achievement that signifies mastery in IS security auditing. Accredited by ANSI, the CISA accreditation has candidates pass an extensive test administered by the ISACA professional group. Progent's CISA security audit consultants can assist your company with:

  • Information Systems Audit Process
  • Information Technology Governance
  • Network Assets and Architecture Lifecycle Planning
  • Information Technology Support
  • Safeguarding Data Assets
  • Business Continuity Preparedness
Get additional information concerning Progent's CISA Qualified Network Security Auditing Engineering Support.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA in 2010 to verify a consultant's ability to design, deploy, and maintain IS controls to reduce risk. Progent can provide the expertise of a CRISC-certified consultant to help you to create and execute a business continuity plan that follows industry best practices promoted by CRISC and crafted to match your organization's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC-qualified IT risk management specialists can provide a variety of risk evaluation services including:

  • Gather data and review documentation to help identify major risk scenarios
  • Inventory statutory, industry, and contractual requirements and organizational policies associated with your network to determine their potential influence on your strategic objectives
  • Point out possible threats for your operational processes to help in analyzing your corporate risk
  • Create a risk awareness initiative and provide training to ensure your organization appreciate IT risk so they can assist with your risk control process
  • Connect key risk scenarios to related operational processes to help determine risk responsibility
  • Determine risk tolerance with your senior management and major stakeholders to ensure they match
Read the details about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Qualified Security Consulting Support
Global Information Assurance Certification was founded in 1999 to validate the knowledge of computer security experts. GIAC's mission is to verify that a certified professional has the skills appropriate to provide support in critical categories of network, data, and application security. GIAC certifications are recognized by businesses and government organizations around the world including and the United States National Security Agency (NSA). Progent's GIAC-certified information security audit experts are available to help your IT organization with:

  • Auditing IT Infrastructure
  • Incident Response
  • Intrusion Detection
  • Web Application Security
  • SIEM solutions
Find out more information about Progent's GIAC Information Assurance Support.

Get in Touch with a Progent Security Expert
To learn how you can contact a certified Progent security consultant for remote or on-premises support in Arizona, call 1-800-993-9400 or go to Remote Computer Support.














© 2002- 2019 Progent Corporation. All rights reserved.