Small business computer networks in the state of Arizona can have fast and economical remote technical support from Progent's qualified security professionals to help with complex security problems. The cost is affordable, charges are per minute, engagement is quick, and service is world class. Progent also provides assistance for long-term projects that demand the expertise of senior security consultants with top security certifications.

If your Arizona business is located outside of larger urban areas including Phoenix, Tucson, Mesa, or Glendale, the availability of nearby certified network security professionals is often problematic during a security disaster. This can result in a loss of productivity for your business, upset clients, idle workers, and distracted executives. By utilizing Progent's online services, you can get in touch with a certified security professional ready to offer expertise whenever you need it to get your computer network on line and salvage your data.

Progent can assist you in all your efforts to protect your network with support ranging from network security checks to developing a company-wide security plan. Progent offers economical service to assist businesses of all sizes to design and maintain secure IT environments powered by Microsoft Windows and Cisco technology and that may include servers and desktops running UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as BYOD clients with Apple iPhones and iPads or Android or Windows Phone devices.

Progent can also assist you to outsource spam blocking and defense against email-borne assaults. Email Guard is Progent's email security solution that uses the services and infrastructure of top information security vendors to deliver web-based control and comprehensive protection for your email traffic. The hybrid architecture of Email Guard combines cloud-based filtering with an on-premises security gateway appliance to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based malware. ProSight Email Guard's Cloud Protection Layer serves as a first line of defense and blocks most unwanted email from making it to your security perimeter. This reduces your exposure to external attacks and saves network bandwidth and storage. ProSight Email Guard's on-premises security gateway device adds a further layer of analysis for incoming email. For outbound email, the local security gateway offers AV and anti-spam protection, protection against data leaks, and encryption. The on-premises security gateway can also help Microsoft Exchange Server to track and safeguard internal email that originates and ends inside your corporate firewall.

Progent's certified engineers are available online or on site to offer a variety of emergency or project-based computer security services which include:

If your business has an immediate need for computer security help, refer to Progent's Emergency Online Network Help.

Progent's support professionals offer world-class support in key fields of computer protection that include security evaluation, firewalls and VPN, and advanced security planning.

Security Assessment
Progent's expert security engineers can evaluate the effectiveness of your existing network protection environment by performing exhaustive remote automated analysis based on advanced software tools and tested procedures. Progent's experience in this testing saves you money and assures an objective portrayal of gaps. The knowledge your company is provided can be used as the foundation of a network protection plan that will permit your network to run safely and adapt rapidly to future threats.

Automated Vulnerability Audits
Progent offers consulting in the use of security testing packages such as Microsoft Baseline Security Analyzer and GFI LANguard Network Security Scanner for economically performing a set of programmed network auditing checks to uncover potential security gaps. Progent has broad experience with additional network analysis utilities including NMAP Port Scanner, AMAP Application Scanner, eEye, as well as utilities like Metasploit, Netcat, Socat, and Nikto. Progent can help you to understand audit reports and react appropriately.

Progent can show you how to build protection into your company operations, install auditing applications, define and implement a protected system environment, and suggest procedures to optimize the security of your network. Progent's security engineers are available to assist you to configure a firewall, design safe remote connectivity to email and business applications, and integrate VPN. Learn more on Progent's network security evaluation.

Security Inventory Service Bundles for Small Businesses
Progent has put together two low-cost security inventory and evaluation bundles designed to allow small businesses to receive an objective security evaluation from a certified security consultant. With Progent's External Security Inventory Checkup, a security expert runs an extensive test of your network from beyond your firewalled perimeter to uncover potential weaknesses in the security posture you expose to the public. With Progent's Internal Network Security Inventory Scan, a security expert executes a network scan from an authorized computer inside your company firewall to assess vulnerabilities to inside assaults. Both security inventory services are set up and run from a secured external location. The process is directed by a consultant who has earned high-level security accreditations and who generates a document that summarizes and interprets the data collected by the security scan and proposes practical improvements where appropriate.

Stealth Penetration Testing Support Services
Stealth intrusion checking is an important part of any serious network security plan. Progentís security experts can run extensive intrusion checks without the awareness of your company's internal network support resources. Unannounced penetration checking shows whether existing security defense systems such as intrusion incident alerts and event history monitoring are correctly configured and consistently checked. Find out more on Progent's network penetration testing consulting.

Firewall and Virtual Private Network Expertise
Progent's background in network security solutions encompasses extensive familiarity with leading firewalls and Virtual Private Network (VPN) technology from a variety of companies such as Cisco, Microsoft, and CheckPoint. Progent can provide the services of consultants with key networking accreditations including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Troubleshooting
The latest generation of Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver substantially more performance than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 firewalls for new deployments. Since Cisco's purchase of Sourcefire, the whole line of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed network intrusion protection system. Firepower services provide powerful new features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can assist your company to maintain your existing PIX or Cisco ASA 5500 security appliances or migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your organization to design, deploy, tune, manage and debug firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. See additional information about Cisco ASA Firewalls with Firepower Services integration and troubleshooting support.

Cisco Network Security and VPN Engineering Expertise
Cisco's network security and remote access technology represent a full line of easy-to-administer security products to help protect your wired and wireless network infrastructure. Cisco's VPN line includes routers, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's expert staff of consultants includes experienced specialists with Cisco Certified Internetwork Expert and Cisco Certified Network Professional certifications who can assist your company to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that align best with your company goals. Read more details concerning Progent's Engineering Services for Cisco Security and VPN Appliances.

Consulting Expertise for Additional Firewall and VPN Technology
Progent provides small and medium size organizations expert consulting for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and Virtual Private Network security companies such as Check Point Software, Juniper Networks, and SonicWALL. Progent can show you how to design a detailed security strategy and select the right technologies from a variety of suppliers to support your security objectives while staying within your budget limits.

Progent's Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight family of network monitoring and management services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that incorporates the technology of top data security companies to provide web-based management and comprehensive security for all your email traffic. The powerful structure of Email Guard managed service combines a Cloud Protection Layer with an on-premises security gateway appliance to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. Email Guard's cloud filter acts as a first line of defense and blocks most threats from reaching your network firewall. This reduces your vulnerability to inbound threats and conserves system bandwidth and storage space. Email Guard's onsite gateway appliance provides a further layer of analysis for incoming email. For outbound email, the onsite security gateway offers anti-virus and anti-spam filtering, DLP, and email encryption. The on-premises security gateway can also help Microsoft Exchange Server to track and protect internal email that originates and ends inside your corporate firewall. For more details, visit Email Guard spam filtering and data leakage protection.

ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates cutting edge behavior-based analysis tools to defend endpoint devices and physical and virtual servers against modern malware assaults like ransomware and file-less exploits, which routinely get by legacy signature-matching AV products. ProSight Active Security Monitoring safeguards local and cloud resources and offers a single platform to manage the entire threat progression including filtering, detection, containment, cleanup, and post-attack forensics. Top capabilities include single-click rollback using Windows Volume Shadow Copy Service and automatic network-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.

ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent provide small and mid-sized organizations an affordable end-to-end solution for reliable backup/disaster recovery. Available at a low monthly rate, ProSight Data Protection Services automates and monitors your backup processes and allows rapid restoration of vital files, apps and virtual machines that have become lost or corrupted due to component breakdowns, software glitches, natural disasters, human mistakes, or malware attacks such as ransomware. ProSight DPS can help you protect, recover and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware images. Critical data can be backed up on the cloud, to a local storage device, or to both. Progent's BDR consultants can provide world-class support to configure ProSight Data Protection Services to to comply with government and industry regulatory requirements like HIPPA, FIRPA, PCI and Safe Harbor and, whenever necessary, can help you to recover your critical data. Read more about ProSight DPS Managed Cloud Backup.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, retrieve and protect data about your IT infrastructure, procedures, business apps, and services. You can instantly locate passwords or serial numbers and be warned automatically about impending expirations of SSLs or domains. By cleaning up and organizing your network documentation, you can save as much as 50% of time wasted looking for critical information about your IT network. ProSight IT Asset Management includes a common location for holding and collaborating on all documents related to managing your network infrastructure like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports advanced automation for collecting and relating IT data. Whether youíre making enhancements, performing regular maintenance, or responding to an emergency, ProSight IT Asset Management gets you the information you require when you need it. Learn more about ProSight IT Asset Management service.

Expert Security Planning
Any business should have a thoroughly thought out security program that includes both proactive procedures and reaction planning. The pre-attack plan is a collection of steps that help to reduce security weaknesses. The reactive strategy assists your network security personnel to assess the impact resulting from a security penetration, repair the system, record the experience, and get the IT network restored as quickly as feasible.

Progent's expert IT security engineers are available to assist you to run a comprehensive vulnerability assessment and create a network security strategy to implement security processes and controls to mitigate future assaults and threats.

CISM Qualified System Security Engineering Services
The Certified Information Security Manager (CISM) organization defines the basic capabilities and international standards of performance that information security managers are expected to learn. It provides executive management the confidence that consultants who have qualified for their CISM certification have the background and knowledge to deliver effective security management and consulting consulting. Progent can provide the services of CISM certified security consultants to help businesses with:

  • Network Security Strategies
  • Risk Management
  • IS Security Implementation Management
  • Network Security Management
  • Recovery Planning
Find out more information about Progent's CISM Accredited Information Security Engineering Expertise.

CISSP Certified Security Consulting Support
The CISSP credential denotes mastery of a worldwide standard for data security. ANSI (American National Standards Institute) has granted certification accreditation in the area of information protection defined by ISO 17024. Progent can provide access to of security consultants who have earned CISSP accreditation. Progent can give you access to a CISSP-certified consultant to help your enterprise in a variety security areas including:

  • Security Management Practices
  • Security Infrastructure and Paradigms
  • Access Management Systems and Processes
  • Software Development Security
  • Secure Operations
  • Physical Security
  • Cryptography Technology
  • Telecom, LAN and WAN Security
  • Business Continuity Planning
Find out more details concerning Progent's CISSP-certified Network Security Engineering Professionals.

ISSAP Certified Secure System Architecture Engineering Assistance
Progent's ISSAP qualified IT architecture professionals are experts who have been awarded ISSAP status as a result of thorough testing and extensive experience with information security design. The ISSAP certification indicates demonstrated skill in the most in-depth demands of information system security architecture within the wider field of information security expertise needed for CISSP certification. Progent's ISSAP-qualified security experts can assist your company with all aspects of architecture security such as.

  • Access Control Systems and Techniques
  • Phone System and System Infrastructure Protection
  • Cryptography Solutions
  • Needs Analysis and Security Criteria
  • Business Continuity Planning and Disaster Recovery Planning
  • Site Security
Learn more information about Progent's ISSAP Accredited Secure System Architecture Engineering Professionals.

CISA Qualified Security Auditing Engineering Services
The Certified Information Systems Auditor (CISA) accreditation is an important achievement that indicates expertise in network security auditing. Certified by ANSI, the CISA accreditation requires that candidates undergo an extensive test given by the ISACA international professional association. Progent's CISA-certified IS security audit engineers can help your IT organization with:

  • Information Systems Audit Services
  • IT Enforcement
  • Network Assets and Infrastructure Planned Useful Life
  • Information Technology Service Delivery
  • Protecting Information Resources
  • Disaster Recovery Preparedness
Find out more information concerning Progent's CISA Qualified Information System Security Auditing Engineering Support.

CRISC Consultants
The CRISC program was initiated by ISACA in 2010 to verify a consultant's ability to plan, implement, and support IS controls to mitigate risk. Progent offers the services of a CRISC-certified engineer to assist your company to develop and carry out a business continuity plan based on industry best practices promoted by CRISC and crafted to align with your company's risk appetite, business objectives, and IT budget. Progent's CRISC network risk management experts can provide a variety of risk evaluation services such as:

  • Collect data and review documentation to identify significant risk scenarios
  • Identify legal, regulatory, and contractual requirements and organizational standards related to your information system to assess their possible influence on your business objectives
  • Identify potential threats for your business processes to assist in evaluating your enterprise risk
  • Develop a risk awareness initiative and provide seminars to make sure your organization understand information system risk so they can assist with your risk management program
  • Match key risk scenarios to your associated operational processes to help determine risk ownership
  • Determine risk tolerance with executive management and major stakeholders to make sure they are in agreement
Get more information concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Certified Information System Security Consulting Expertise
Global Information Assurance Certification was established in 1999 to certify the knowledge of network security experts. GIAC's mission is to ensure that an accredited professional possesses the knowledge appropriate to provide services in vital areas of system, data, and application software security. GIAC certifications are acknowledged by companies and government organizations all over the world including and the U.S. National Security Agency (NSA). Progent's GIAC network security audit experts are available to help your business with:

Find out more details about Progent's GIAC Information Assurance Support.

Contact a Certified Security Specialist
To learn how to contact a certified security engineer for online or on-premises support in Arizona, phone 1-800-993-9400 or go to Online Computer Help.














© 2002- 2018 Progent Corporation. All rights reserved.