Business networks in the state of California can now get quick and economical online technical support from Progent's qualified security support specialists to fix complex security problems. Rates are affordable, charges are per minute, sign-up is quick, and service is world class. Progent also provides assistance for long-term engagements that demand the expertise of seasoned security consultants with top industry certifications.

If your California organization is situated far from more populated urban neighborhoods including Los Angeles, San Diego, San Jose, San Francisco, Long Beach, Fresno, or Sacramento, access to nearby qualified security engineers is often limited during a crisis. This can cause lost revenue for your company, angry clients, unproductive workers, and distracted management. By calling Progent's remote support, you have access to a certified security engineer who can offer assistance whenever you need it to keep your computer network running and restore your data.

Progent can assist you at any level in your initiatives to defend your network with services ranging from security audits to creating a comprehensive security plan. Progent offers affordable service to help companies of any size to design and manage protected IT environments powered by Microsoft Windows and Cisco products and that may include servers and desktops based on UNIX or Linux platforms plus BYOD users with Apple iOS handhelds or Android or Windows Phone devices.

Progent can also help you outsource spam filtering and defense against e-mail-based security threats. Email Guard is Progent's email security platform that uses the services and infrastructure of leading data security vendors to deliver web-based management and comprehensive security for all your inbound and outbound email. The powerful structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local gateway appliance to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based threats. The cloud filter acts as a preliminary barricade and blocks the vast majority of unwanted email from making it to your security perimeter. This reduces your vulnerability to inbound threats and conserves network bandwidth and storage space. ProSight Email Guard's on-premises security gateway appliance provides a deeper layer of analysis for incoming email. For outgoing email, the onsite gateway offers AV and anti-spam protection, DLP, and email encryption. The onsite security gateway can also enable Exchange Server to monitor and safeguard internal email that originates and ends within your security perimeter.

Progent's certified engineers are accessible remotely or on premises to offer a variety of emergency or longer-term network security services which include:

  • Perform comprehensive network security audits
  • Recuperate quickly after serious security breaches
  • Configure hardware and software firewalls
  • Configure safe techniques for remote and mobile connectivity
  • Deploy advanced solutions for defense against viruses, spam and directory harvest attacks
  • Develop a comprehensive security strategy with round-the-clock monitoring
  • Offer outsourced Help Desk Call Center Services
  • Help Create an effective backup and disaster recovery solution built around Microsoft Data Protection Manager backup capability
If your company has an urgent requirement for IT security help, go to Progent's Urgent Remote Technical Help.

Progent's support professionals offer world-class services in vital facets of network security including security assessment, firewalls and VPN, and advanced security planning.

System Evaluation
Progent's expert security consultants can evaluate the effectiveness of your current computer protection environment by performing exhaustive remote automated analysis via sophisticated utilities and tested procedures. Progent's experience in administering this service saves you time and money and assures an objective picture of system vulnerability. The knowledge your company gains can be used as the foundation of a network protection strategy that can permit your information system to operate safely and adapt rapidly to new threats.

Automated Security Audits
Progent provides consulting in the application of security analysis utilities such as Microsoft Baseline Security Analyzer (MBSA) and LANguard from GFI for economically running a variety of automatic network testing checks to uncover possible security gaps. Progent has extensive knowledge of other network auditing utilities such as NMAP, AMAP, eEye, plus tools such as Metasploit Framework, Hydra, and Nikto. Progent can help you to make sense of testing reports and respond appropriately.

Progent can show you how to build security into your company operations, configure auditing tools, plan and implement a secure system architecture, and recommend policies to optimize the safety of your IT system. Progent's security consultants are able to help you set up a firewall, design safe remote access to email and business applications, and integrate virtual private network. Learn more on Progent's automated security analysis.

Security Inventory Scanning Bundles for Small Companies
Progent offers two low-cost security inventory and evaluation packages intended to allow small businesses to receive a professional security evaluation from a qualified security expert. With Progent's External Network Security Inventory Scan, a security expert runs an extensive test of your IT infrastructure from outside your firewall to uncover potential weaknesses in the security profile you present to the outside world. With Progent's Internal Network Security Inventory Scan, a security expert executes a system scan from an authorized machine inside your firewall to assess your exposure to internal threats. The two security inventory services are configured and run from a secured remote location. The project is managed by an engineer with top security accreditations and who generates a document that details and analyzes the information captured by the security scan and proposes practical remediation if appropriate.

Stealth Intrusion Testing Consulting
Stealth intrusion checking is a key component of any comprehensive network security plan. Progentís security professionals can perform thorough penetration tests without the knowledge of your company's in-house IT resources. Unannounced penetration checking shows whether current security monitoring tools such as intrusion incident warnings and event log analysis are properly set up and actively monitored. Learn more on Progent's stealth security penetration analysis consulting.

Firewall And Virtual Private Network (VPN) Solutions
Progent's expertise in network security technology encompasses in-depth familiarity with leading firewalls and VPN products offered by a variety of vendors including Cisco, Microsoft, and Juniper. Progent offers the services of engineers who have earned key networking certifications such as CCIE and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Integration and Troubleshooting
The latest generation of Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer substantially more bang for the buck than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX security appliances for new deployments. After Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X devices can be configured to enable Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed network intrusion protection system. Firepower services bring powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can help you to maintain your current PIX or Cisco ASA 5500 firewalls or upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can help your business to plan, integrate, optimize, manage and debug firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. Find out additional details about Cisco ASA Firewalls with Firepower configuration and debugging support.

Cisco Security and VPN Engineering Expertise
Cisco's network security and offsite access technology offer a full range of easy-to-administer security solutions to help safeguard your wired and wireless network infrastructure. Cisco's Virtual Private Network product family includes switches, firewalls, intrusion detection systems and VPN concentrators. Progent's expert consulting staff includes experienced engineers with Cisco's Certified Internetwork Expert and CCNP certifications who can assist your business to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that align most closely with your business goals. Find out additional information concerning Progent's Engineering Expertise for Cisco Security Technology and Virtual Private Network Products.

Consulting Services for Additional Firewall and VPN Technology
Progent provides small and medium size companies expert consulting for Intrusion Protection Systems and IPsec VPN technology from leading firewall and VPN security vendors including Check Point Software, Juniper Networks, and SonicWALL. Progent can show you how to create a comprehensive security plan and select appropriate products from multiple suppliers to achieve your security objectives while staying within your budget limits.

Progent's Flat-rate Managed Services for Information Assurance
Progent's affordable ProSight line of outsourced network management services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance. Managed services offered by Progent include:
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the technology of leading data security vendors to provide centralized control and comprehensive security for your email traffic. The powerful architecture of Progent's Email Guard managed service combines cloud-based filtering with an on-premises gateway appliance to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne threats. Email Guard's cloud filter acts as a first line of defense and blocks most unwanted email from reaching your security perimeter. This reduces your exposure to inbound attacks and conserves system bandwidth and storage. Email Guard's onsite gateway device adds a further level of analysis for incoming email. For outgoing email, the on-premises gateway offers anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The onsite gateway can also help Microsoft Exchange Server to monitor and safeguard internal email that stays inside your corporate firewall. For more information, see Email Guard spam and content filtering.

ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates cutting edge behavior-based machine learning tools to defend endpoint devices as well as servers and VMs against modern malware attacks such as ransomware and file-less exploits, which routinely escape legacy signature-based AV tools. ProSight ASM protects on-premises and cloud resources and offers a single platform to manage the entire threat progression including protection, identification, containment, cleanup, and post-attack forensics. Key features include one-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against new threats. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.

ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent provide small and mid-sized organizations a low cost end-to-end service for reliable backup/disaster recovery (BDR). For a low monthly price, ProSight Data Protection Services automates your backup activities and enables fast restoration of critical data, applications and VMs that have become unavailable or damaged as a result of component breakdowns, software glitches, natural disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, applications, system images, as well as Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to an on-promises device, or mirrored to both. Progent's BDR specialists can deliver advanced expertise to configure ProSight Data Protection Services to be compliant with government and industry regulatory standards like HIPPA, FINRA, and PCI and, whenever necessary, can assist you to restore your business-critical information. Find out more about ProSight DPS Managed Backup and Recovery.

ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, find and protect information about your network infrastructure, procedures, applications, and services. You can instantly find passwords or serial numbers and be alerted automatically about upcoming expirations of SSLs ,domains or warranties. By updating and organizing your IT documentation, you can eliminate as much as 50% of time spent trying to find vital information about your network. ProSight IT Asset Management includes a common repository for storing and sharing all documents related to managing your business network such as standard operating procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and associating IT data. Whether youíre planning enhancements, performing regular maintenance, or responding to a crisis, ProSight IT Asset Management gets you the information you need as soon as you need it. Find out more details about ProSight IT Asset Management service.

Expert Network Security Design
Any business should develop a thoroughly thought out security strategy that includes both proactive procedures and response planning. The proactive plan is a collection of mechanisms that help to reduce vulnerabilities. The post-attack strategy helps your company's IT security engineers to evaluate the damage caused by an attack, fix the system, record the event, and get the IT network operational as soon as possible.

Progent's expert IS security engineers are available to assist you to perform a complete risk assessment and create a computer security strategy to implement security policies and controls to reduce future attacks and threats.

CISM Accredited Information Security Support Expertise
The CISM organization describes the basic capabilities and global standards of performance that information security managers are expected to learn. CISM provides executive management the confidence that consultants who have earned their CISM certification have the experience and knowledge to deliver efficient security management and consulting consulting. Progent can provide the expertise of CISM qualified security professionals to assist companies with:

  • Information Security Governance
  • Risk Management
  • Information Security Implementation Management
  • Information Security Administration
  • Response Management
Read more information about Progent's CISM Certified Security Support Services.

CISSP Accredited Security Engineering Assistance
CISSP recognizes expertise with a global standard for information security. The American National Standards Institute has awarded the CISSP credential recognition in the field of data security under ISO 17024. Progent can provide access to of security experts who have qualified for CISSP accreditation. Progent can provide a CISSP-certified professional to help your company in a broad range of security areas including:

  • Security Management Procedures
  • Security Infrastructure and Paradigms
  • Access Control Solutions and Methodology
  • Applications Development Security
  • Operations Security
  • Site Security
  • Encryption/Decryption Mechanisms
  • Telecom, Network and WAN Security
  • Disaster Recovery Planning
Learn additional details about Progent's CISSP IS Security Consulting Expertise.

ISSAP Accredited Secure Network Architecture Consulting Expertise
Progent's ISSAP certified system architecture professionals are experts who have been awarded ISSAP Certification as a result of rigorous examination and significant experience with network security architecture. The ISSAP credential indicates proven mastery in the most in-depth demands of information security architecture within the broader scope of IS security expertise required for CISSP accreditation. Progent's ISSAP-certified security consultants can assist your company with all aspects of secure network architecture such as.

  • Access Control Mechanisms and Techniques
  • Telecom and Network Security
  • Data Encryption Solutions
  • Requirements Analysis and Security Guidelines
  • Business Continuity Planning (BCP) and Disaster Recovery Planning
  • Hardware Security
Learn additional information about Progent's ISSAP Accredited Secure Information System Architecture Support Expertise.

CISA Certified IS Security Auditing Consulting Services
The Certified Information Systems Auditor (CISA) credential is an important qualification that indicates expertise in IS security audit and control. Certified by the American National Standards Institute (ANSI), the CISA credential has candidates undergo a comprehensive test administered by the ISACA professional group. Progent's CISA-qualified information security audit engineers are available to assist your IT organization with:

  • Information Systems Audit Services
  • Information Technology Enforcement
  • Systems and Architecture Lifecycle Planning
  • IT Service Delivery
  • Safeguarding Data Resources
  • Business Continuity Planning
Find out more information about Progent's CISA Certified Information System Security Auditing Engineering Support.

CRISC Consultants
The CRISC certification program was established by ISACA in 2010 to validate an IT professional's ability to plan, deploy, and maintain IS control mechanisms to reduce risk. Progent offers the services of a CRISC-certified engineer to help your company to develop and execute a workplace continuity strategy based on leading practices identified by CRISC and geared to match your company's risk appetite, business objectives, and IT budget. Progent's CRISC-certified network risk management specialists offer a variety of risk identification services such as:

  • Gather data and review documentation to identify significant risk scenarios
  • Identify statutory, regulatory, and contractual mandates and organizational standards associated with your network to determine their potential impact on your strategic goals
  • Identify possible vulnerabilities for your operational processes to assist in analyzing your corporate risk
  • Create a risk awareness program and provide seminars to make sure your stakeholders appreciate IS risk so they can contribute to your risk control process
  • Match identified risk vectors to your associated business processes to help determine risk ownership
  • Validate risk tolerance with executive leadership and major stakeholders to ensure they align
Find out the details about Progent's CRISC Consultants.

GIAC Certified Security Consulting Services
Global Information Assurance Certification was established in 1999 to certify the knowledge of computer security professionals. GIAC's mission is to verify that an accredited professional has the skills appropriate to provide services in critical categories of system, information, and software security. GIAC certifications are recognized by businesses and government organizations throughout the world including and the United States National Security Agency (NSA). Progent's GIAC-qualified IS security audit experts can help your IT organization with:

  • Auditing Security Systems
  • Security Incident Handling
  • Intrusion Detection
  • Web Application Security
  • SIEM solutions
Find out additional details concerning Progent's GIAC Information Assurance Services.

Contact a Progent Security Expert
To learn how to access a Progent security consultant for online or on-premises assistance in California, phone 1-800-993-9400 or go to Remote Computer Support.

© 2002- 2018 Progent Corporation. All rights reserved.