Company IT networks in the state of California can have quick and economical remote help from Progent's accredited security engineers to fix the toughest security problems. Rates are competitive, billing is per minute, sign-up is immediate, and support is world class. Progent also offers assistance for complex projects that demand the expertise of senior security consultants with top security certifications.

In case your California small business is far from major urban areas like Los Angeles, San Diego, San Jose, San Francisco, Long Beach, Fresno, or Sacramento, help from local certified security engineers could be problematic during a security disaster. This could mean a drop in productivity for your company, angry customers, unproductive workers, and distracted executives. By calling Progent, you can get in touch with a certified security engineer ready to offer help when you have to have it to get your system operating and recover your information.

Progent can help you in all your efforts to defend your IT environment with services ranging from network security audits to creating a comprehensive security plan. Progent offers affordable service to assist businesses of all sizes to set up and maintain secure IT environments powered by Windows and Cisco products and that can include computers based on UNIX or Linux platforms as well as BYOD clients with Apple iOS handhelds or Android or Windows Phone devices.

Progent can also assist you to outsource spam filtering and defense against email-borne security threats. Email Guard is Progent's email security platform that uses the technology of top information security companies to provide centralized management and world-class protection for all your inbound and outbound email. The hybrid structure of Progent's Email Guard managed service combines cloud-based filtering with a local security gateway device to provide complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne threats. Email Guard's Cloud Protection Layer acts as a preliminary barricade and blocks the vast majority of unwanted email from reaching your network firewall. This decreases your vulnerability to external threats and saves network bandwidth and storage space. Email Guard's on-premises security gateway device adds a further layer of inspection for inbound email. For outbound email, the local gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also help Exchange Server to monitor and protect internal email that originates and ends inside your corporate firewall.

Progent's security professionals are accessible remotely or on site to provide a range of emergency or longer-term network security services which include:

If your network has an urgent requirement for IT security support, refer to Progent's Urgent Remote Technical Help.

Progent's engineers offer world-class services in vital areas of system security that include security assessment, firewalls and VPN, and advanced security consulting.

System Security Evaluation
Progent's certified security engineers can evaluate the vulnerability of your current network protection systems through exhaustive remote automated testing via advanced software tools and tested procedures. Progent's skill in this service saves your company money and offers an objective portrayal of gaps. The information your business is provided can form the foundation of a network protection strategy that can allow your information system to run safely and adapt quickly to future risks.

Automated Network Vulnerability Audits
Progent offers consulting in the application of security evaluation packages including MBSA and GFI LANguard NSS for economically running a variety of programmed network testing scans to uncover possible security vulnerabilities. Progent has broad experience with additional security auditing utilities including NMAP Port Scanner, AMAP, eEye, plus utilities such as Metasploit, Netcat, Hydra, and Nikto. Progent can help you to make sense of testing reports and respond effectively.

Progent can help you design protection into your business operations, install auditing tools, define and implement a protected network architecture, and suggest policies to maximize the safety of your network. Progent's security professionals are available to help you configure a firewall, implement safe remote access to email and business applications, and install virtual private network. Learn more on Progent's automated security analysis.

Security Inventory Scanning Bundles for Small Businesses
Progent offers two ultra-affordable security inventory and evaluation bundles designed to enable small businesses to get an objective network security evaluation from a qualified security engineer. With Progent's External Security Inventory Checkup, a security expert administers an extensive examination of your IT infrastructure from outside your firewall to determine possible weaknesses in the security profile you expose to the outside world. With Progent's Internal Security Inventory Scan, a security expert executes a system scan from a secure computer inside your firewall to evaluate vulnerabilities to internal attacks. The two security inventory services are configured and run from a secured external site. The project is managed by a consultant with high-level security credentials and who generates a report that details and interprets the data captured by the security scan and proposes practical improvements where called for.

Network Penetration Analysis Consulting
Stealth penetration checking is an important component of any serious network security plan. Progentís security professionals can perform thorough penetration checks without the knowledge of your organization's in-house network support resources. Stealth penetration checking shows whether existing security monitoring tools such as intrusion detection warnings and event log analysis are correctly set up and consistently checked. Find out additional information about Progent's stealth security penetration testing support services.

Firewall and Virtual Private Network Solutions
Progent's background in network security solutions includes in-depth familiarity with leading firewalls and Virtual Private Network (VPN) products offered by a variety of companies including Cisco, Microsoft, and CheckPoint. Progent can provide the support of engineers who have earned key networking certifications such as CCIE and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Integration and Debugging
The current ASA 5500-X Family of firewalls with Firepower Services deliver substantially more bang for the buck than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 security appliances for new installations. Since Cisco's purchase of Sourcefire, the whole line of Cisco ASA 5500-X firewalls can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular intrusion protection system (IPS). Firepower services provide powerful new features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can help your company to manage your legacy PIX or ASA 5500 firewalls and migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your company to plan, configure, optimize, manage and troubleshoot firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Read additional information about ASA 5500-X Firewalls with Firepower integration and troubleshooting services.

Cisco Network Security and Virtual Private Network Consulting Services
Cisco's security and remote access products offer a complete range of manageable security products to help protect your wired and wireless information system. Cisco's Virtual Private Network line includes routers, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's professional staff of consultants includes field-proven engineers with Cisco Certified Internetwork Expert and Cisco Certified Network Professional qualifications who are able to help your business to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that fit best with your company goals. Read more information about Progent's Support Expertise for Cisco Security and VPN Products.

Support Expertise for Additional Firewall and VPN Technology
Progent provides small and medium size organizations professional consulting for Intrusion Protection Systems and IPSec VPN solutions from leading firewall and Virtual Private Network security companies such as WatchGuard, Juniper Networks, and SonicWALL. Progent can show you how to create a detailed security strategy and select appropriate technologies from multiple suppliers to support your security goals while staying within your budget limits.

Expert Security Planning
Every company should develop a thoroughly thought out security program that incorporates both preventive procedures and response plans. The proactive plan is a set of procedures that help to reduce vulnerabilities. The reactive plan helps your company's security personnel to assess the impact caused by an attack, repair the network, record the event, and get the IT network running as rapidly as possible.

Progent's expert IT security engineers can to help your business to perform a full vulnerability assessment and create a network security plan to implement security processes and mechanisms to minimize ongoing assaults and threats.

CISM Accredited System Security Consulting Expertise
The Certified Information Security Manager (CISM) committee describes the basic capabilities and international standards of performance that information security managers are expected to learn. It provides executive management the confidence that those who have earned their CISM certification have the experience and knowledge to deliver effective security management and support services. Progent can provide the expertise of CISM certified security consultants to help companies with:

  • IS Security Governance
  • Risk Analysis
  • IS Security Program Management
  • Network Security Management
  • Recovery Management
Learn more information concerning Progent's CISM Certified IS Security Consulting Expertise.

CISSP Certified Security Engineering Expertise
CISSP denotes mastery of a global standard for data security. ANSI has granted certification recognition in the area of data protection stipulated by ISO/IEC 17024. Progent can provide the services of security experts who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified expert to help your organization in a broad range of security fields such as:

  • Security Administration Procedures
  • Security Architecture and Models
  • Access Management Systems and Processes
  • Software Development Security
  • Secure Operations
  • Site Security
  • Data Encryption Mechanisms
  • Telecom, LAN and Internet Security
  • Business Continuity Preparedness
Read more details concerning Progent's CISSP Qualified Security Support Expertise.

ISSAP Accredited Secure Information System Architecture Engineering Expertise
Progent's ISSAP certified system architecture professionals are experts who have earned ISSAP Certification through thorough testing and significant work with information security architecture. The Information System Security Architecture Professional (ISSAP) credential represents proven skill in the most challenging requirements of IS security architecture within the broader field of information system security expertise required for CISSP certification. Progent's ISSAP-qualified security specialists can assist your company with all aspects of architecture security including.

  • Access Management Mechanisms and Techniques
  • Telecommunications and Network Infrastructure Security
  • Encryption/Decryption Solutions
  • Requirements Evaluation and Security Guidelines
  • Business Continuity Planning and DRP
  • Hardware Security
Find out more information concerning Progent's ISSAP Accredited Secure System Architecture Consulting Professionals.

CISA Certified IS Security Auditing Engineering Support
The CISA credential is an important achievement that signifies mastery in information system security auditing. Accredited by ANSI, the CISA accreditation has consultants undergo an extensive test administered by the ISACA professional association. Progent's CISA-qualified network security audit engineers are available to help your company with:

  • Information Systems Audit Process
  • IT Governance
  • Systems and Infrastructure Planned Useful Life
  • IT Support
  • Safeguarding Information Assets
  • Disaster Recovery Preparedness
Learn more details about Progent's CISA Qualified Network Security Auditing Consulting Assistance.

CRISC Experts
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to validate an IT professional's ability to plan, implement, and support IS control mechanisms to mitigate risk. Progent can provide the services of a CRISC-certified engineer to help your company to create and carry out a business continuity or disaster recovery plan based on leading practices identified by CRISC and crafted to match your organization's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC-qualified network risk mitigation engineers offer a variety of risk assessment services including:

  • Collect data and review documentation to evaluate major vulnerabilities
  • Identify legal, regulatory, and contractual requirements and company policies associated with your network to determine their possible influence on your strategic goals
  • Identify possible vulnerabilities for your business workflows to assist in analyzing your corporate risk
  • Develop a risk awareness program and conduct seminars to make sure your stakeholders appreciate IS risk so they can assist with your risk control program
  • Match identified risk scenarios to your associated operational processes to help determine risk responsibility
  • Determine risk appetite with your senior management and key stakeholders to ensure they are in agreement
Read additional details about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Accredited Information System Security Consulting Expertise
Global Information Assurance Certification was founded in 1999 to validate the knowledge of IT security professionals. GIAC's goal is to assure that a certified security consultant possesses the knowledge appropriate to deliver support in important areas of system, information, and software security. GIAC accreditations are acknowledged by businesses and institutions around the world including and the U.S. National Security Agency (NSA). Progent's GIAC network security audit experts are available to help your company in the areas of:

Learn more information concerning Progent's GIAC Information Assurance Services.

Get in Touch with a Security Specialist
To learn how you can contact a certified Progent security consultant for online or on-premises expertise in California, phone 1-800-993-9400 or go to Online Network Help.

© 2002- 2017 Progent Corporation. All rights reserved.