Company IT networks in California can depend on quick and affordable remote access to Progent's qualified network security experts to fix critical security issues. Rates are competitive, charges are per minute, sign-up is fast, and support is unbeatable. Progent also offers assistance for complex engagements that demand the services of seasoned security engineers with high-level security certifications.

In case your California office is based outside of larger urban neighborhoods such as Los Angeles, San Diego, San Jose, San Francisco, Long Beach, Fresno, or Sacramento, support from nearby qualified security consultants could be limited when there's a crisis. This could mean lost productivity for your business, upset clients, idle employees, and defocused management. By utilizing Progent's remote support, you have access to a certified security consultant ready to offer help whenever you need it to get your information system operating and restore your data.

Progent can assist you in all your initiatives to guard your IT environment with support that can range from security assessments to creating a company-wide security plan. Progent offers economical service to help businesses of all sizes to set up and maintain safe IT environments based on Windows and Cisco technology and that may include computers running UNIX or Linux operating systems plus BYOD clients with Apple iOS iPhones and iPads or Google Android or Windows Phone handsets.

Progent can also help you outsource spam filtering and defense against e-mail-based assaults. Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of leading data security vendors to deliver web-based management and comprehensive protection for your email traffic. The hybrid structure of Email Guard managed service combines cloud-based filtering with an on-premises security gateway appliance to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne threats. The Cloud Protection Layer acts as a first line of defense and keeps most unwanted email from reaching your security perimeter. This decreases your vulnerability to inbound threats and saves system bandwidth and storage space. ProSight Email Guard's on-premises gateway appliance provides a deeper level of inspection for inbound email. For outbound email, the on-premises security gateway provides AV and anti-spam filtering, DLP, and email encryption. The local security gateway can also help Exchange Server to track and protect internal email traffic that stays inside your corporate firewall.

Progent's certified consultants are available online or in person to offer a variety of emergency or project-based computer security services which include:

  • Run comprehensive network security evaluations
  • Recuperate quickly after virus and worm attacks
  • Set up firewalls from multiple vendors
  • Implement safe techniques for remote and mobile access
  • Deploy advanced applications for automatic protection against viruses, spam and directory harvest attacks
  • Develop a comprehensive security strategy with proactive network monitoring
  • Offer comprehensive Call Center Support
  • Create a practical backup and recovery strategy centered on System Center Data Protection Manager backup technology
If your business has an emergency requirement for computer security support, go to Progent's Emergency Online Network Support.

Progent's security experts offer world-class services in key facets of computer protection that include auditing, firewall and VPN solutions, and high-level security planning.

Security Evaluation
Progent's certified security consultants can evaluate the effectiveness of your existing computer protection systems through exhaustive remote automated testing based on advanced software tools and proven techniques. Progent's experience in this service saves your company consulting fees and assures a detailed picture of weaknesses. The knowledge your company gains can make up the foundation of a network protection strategy that will permit your network to operate dependably and adapt quickly to new risks.

Automated Vulnerability Assessment
Progent provides consulting in the application of security auditing software such as MBSA and GFI LANguard for economically running a set of programmed network auditing checks to identify potential security gaps. Progent has broad experience with other security auditing products such as NMAP, AMAP Application Scanner, eEye, as well as tools like Metasploit, Hydra, and Nikto. Progent can show you how to understand testing reports and react appropriately.

Progent can show you how to design protection into your company operations, install scanning tools, define and implement a secure network environment, and recommend policies to maximize the security of your network. Progent's security professionals are ready to show you how to configure a firewall, design safe remote connectivity to email and data, and integrate virtual private network. Learn additional information on Progent's network security evaluation.

Security Inventory and Evaluation Bundles for Small Companies
Progent has put together two ultra-affordable security inventory scanning packages intended to allow small businesses to receive an impartial security assessment from a certified security engineer. With Progent's External Security Inventory Scan, an engineer runs a comprehensive test of your network from outside your company firewall to determine potential risks in the security posture you expose to the outside world. With Progent's Internal Network Security Inventory Checkup, a security engineer executes a network scan from a secure machine within your company firewall to assess your exposure to inside assaults. Both security inventory packages are set up and run from a protected external site. The project is directed by an engineer who has earned high-level security credentials and who produces a report that summarizes and analyzes the data collected by the scan and suggests cost-effective remediation where called for.

Network Security Penetration Analysis Support Services
Stealth penetration checking is an important part of any comprehensive IT system security strategy. Progent’s security professionals can run extensive intrusion checks without the awareness of your company's in-house network support resources. Stealth penetration testing shows whether current security monitoring systems such as intrusion detection alerts and event history monitoring are correctly set up and consistently checked. Find out more on Progent's stealth security penetration analysis consulting.

Firewalls and VPN Support
Progent's expertise in security technology encompasses in-depth familiarity with major firewalls and Virtual Private Network technology offered by multiple companies such as Cisco, Microsoft, and Juniper. Progent can provide the support of engineers with key networking certifications including CCIE and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Troubleshooting
The latest generation of Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide significantly more performance than Cisco's previous firewalls and have superseded the ASA 5500 and PIX firewalls for new installations. Since Cisco's purchase of Sourcefire, the whole family of Cisco ASA 5500-X devices can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the market's most popular intrusion protection system. Firepower services bring enhanced features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network experts can help your company to manage your legacy PIX or Cisco ASA 5500 firewalls or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your organization to plan, integrate, tune, manage and debug firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Read additional information about ASA 5500-X Firewalls with Firepower integration and debugging support.

Cisco Security and VPN Consulting Expertise
Cisco's network security and offsite connection technology offer a full range of easy-to-administer security products to help protect your wired and wireless network infrastructure. Cisco's VPN line includes routers, firewalls, intrusion detection systems and VPN appliances. Progent's expert consulting staff includes field-proven engineers with Cisco CCIE and CCNP certifications who can assist your business to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that fit best with your company goals. Read more information concerning Progent's Support Services for Cisco Security Solutions and VPN Appliances.

Support Expertise for Other Firewall and Virtual Private Network Solutions
Progent offers small and medium size businesses expert consulting for Intrusion Protection products and IPsec VPN solutions from leading firewall and VPN security companies including WatchGuard, Juniper, and Symantec. Progent can help you design a detailed security strategy and choose the right products from multiple suppliers to support your security goals while staying within your spending restraints.

Progent's Flat-rate Managed Services for Information Assurance
Progent's low-cost ProSight line of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection service that incorporates next generation behavior analysis tools to defend endpoint devices as well as physical and virtual servers against modern malware attacks such as ransomware and file-less exploits, which routinely get by traditional signature-based AV tools. ProSight ASM protects on-premises and cloud-based resources and provides a single platform to automate the entire threat lifecycle including blocking, infiltration detection, containment, cleanup, and post-attack forensics. Key capabilities include single-click rollback with Windows Volume Shadow Copy Service and real-time system-wide immunization against newly discovered attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
ProSight Enhanced Security Protection services deliver ultra-affordable multi-layer protection for physical servers and VMs, desktops, mobile devices, and Microsoft Exchange. ProSight ESP utilizes contextual security and advanced heuristics for round-the-clock monitoring and reacting to security assaults from all vectors. ProSight ESP delivers two-way firewall protection, intrusion alarms, endpoint management, and web filtering through cutting-edge technologies incorporated within one agent managed from a single control. Progent's data protection and virtualization experts can assist your business to design and implement a ProSight ESP deployment that addresses your company's unique needs and that allows you prove compliance with government and industry data security standards. Progent will help you define and implement security policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alerts that require immediate action. Progent's consultants can also help you to set up and test a backup and disaster recovery system such as ProSight Data Protection Services (DPS) so you can recover quickly from a potentially disastrous cyber attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Microsoft Exchange email filtering.

ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services offer small and mid-sized businesses an affordable end-to-end solution for secure backup/disaster recovery. For a low monthly cost, ProSight DPS automates and monitors your backup activities and enables fast recovery of vital files, apps and virtual machines that have become lost or damaged as a result of component breakdowns, software bugs, disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images, plus Hyper-V and VMware images. Critical data can be backed up on the cloud, to an on-promises storage device, or mirrored to both. Progent's BDR specialists can provide world-class support to set up ProSight Data Protection Services to to comply with government and industry regulatory standards such as HIPPA, FINRA, PCI and Safe Harbor and, when needed, can help you to recover your business-critical information. Find out more about ProSight DPS Managed Backup and Recovery.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that incorporates the technology of top data security vendors to provide centralized management and world-class security for your email traffic. The powerful structure of Progent's Email Guard managed service combines a Cloud Protection Layer with an on-premises gateway device to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne threats. The Cloud Protection Layer acts as a first line of defense and blocks most unwanted email from making it to your security perimeter. This decreases your exposure to external attacks and saves network bandwidth and storage. Email Guard's onsite gateway appliance provides a deeper level of inspection for inbound email. For outbound email, the onsite security gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The local security gateway can also help Microsoft Exchange Server to track and safeguard internal email that originates and ends inside your security perimeter. For more information, visit ProSight Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small organization can have its critical servers and apps hosted in a secure Tier III data center on a fast virtual host set up and maintained by Progent's network support professionals. With the ProSight Virtual Hosting model, the customer retains ownership of the data, the OS platforms, and the applications. Since the environment is virtualized, it can be moved easily to an alternate hosting environment without requiring a lengthy and technically risky configuration process. With ProSight Virtual Hosting, your business is not tied a single hosting service. Find out more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, maintain, find and safeguard information about your network infrastructure, procedures, business apps, and services. You can instantly locate passwords or IP addresses and be warned automatically about impending expirations of SSLs or domains. By cleaning up and organizing your IT documentation, you can eliminate as much as 50% of time thrown away searching for vital information about your IT network. ProSight IT Asset Management features a common location for holding and collaborating on all documents required for managing your business network such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers a high level of automation for gathering and associating IT information. Whether you’re making enhancements, doing maintenance, or responding to a crisis, ProSight IT Asset Management delivers the data you need when you need it. Find out more details about Progent's ProSight IT Asset Management service.

Certified Network Security Planning
Any business ought to develop a thoroughly considered security program that incorporates both proactive procedures and reaction planning. The pre-attack strategy is a set of steps designed to reduce vulnerabilities. The reactive strategy helps your IT security engineers to assess the impact resulting from an attack, fix the system, document the event, and get business functions restored as quickly as feasible.

Progent's expert IT security consultants can to assist you to run a comprehensive vulnerability assessment and create a network security strategy to implement security processes and mechanisms to reduce ongoing assaults and dangers.

CISM Accredited Security Consulting Expertise
The CISM committee defines the basic capabilities and global standards of skill that IT security managers are expected to master. It provides executive management the confidence that those who have qualified for their CISM certification possess the background and capability to provide efficient security management and consulting consulting. Progent offers the support of CISM certified security professionals to assist companies with:

  • Information Security Strategies
  • Vulnerability Management
  • IS Security Implementation Management
  • Network Security Administration
  • Response Management
Read additional information concerning Progent's CISM Qualified IS Security Engineering Expertise.

CISSP Certified Security Consulting Assistance
The CISSP credential recognizes expertise with an international standard for network security. The American National Standards Institute has granted certification accreditation in the area of data security stipulated by ISO/IEC 17024. Progent can provide access to of security consultants who have earned CISSP certification. Progent can give you access to a CISSP-certified expert to help your organization in a broad range of security fields such as:

  • Security Administration Practices
  • Security Architecture and Paradigms
  • Access Control Solutions and Processes
  • Software Development Security
  • Secure Operations
  • Site Security
  • Encryption/Decryption Mechanisms
  • Telecom, LAN and Internet Security
  • Disaster Recovery Preparedness
Read more details about Progent's CISSP Accredited Security Consulting Professionals.

CISSP-ISSAP Accredited Secure System Architecture Consulting Services
Progent's CISSP-ISSAP qualified system architecture engineers are experts who have earned ISSAP Certification as a result of rigorous testing and significant work with network security design. The ISSAP certification indicates demonstrated mastery in the more complex demands of IS security architecture bounded by the broader field of information system security knowledge required for CISSP certification. Progent's ISSAP-qualified security specialists can help your company with all aspects of secure network architecture such as.

  • Access Management Mechanisms and Methodologies
  • Telecommunications and System Infrastructure Protection
  • Cryptography Options
  • Needs Evaluation and Security Criteria
  • Business Continuity Planning (BCP) and Disaster Recovery Planning
  • Physical Security
Learn more details concerning Progent's ISSAP Certified Secure Information System Architecture Consulting Services.

CISA Accredited IS Security Auditing Engineering Services
The Certified Information Systems Auditor (CISA) accreditation is a prestigious qualification that signifies mastery in information system security auditing. Accredited by the American National Standards Institute, the CISA credential has candidates pass an extensive test administered by the ISACA international professional group. Progent's CISA information security audit specialists can assist your company in the areas of:

  • IS Audit Process
  • IT Enforcement
  • Network Assets and Architecture Lifecycle
  • Information Technology Service Delivery
  • Safeguarding Information Resources
  • Business Continuity Planning
Learn more details about Progent's CISA Accredited Network Security Auditing Engineering Assistance.

CRISC Consultants
The CRISC certification program was initiated by ISACA to verify a consultant's ability to design, deploy, and support IS controls to reduce risk. Progent offers the services of a CRISC-certified consultant to help you to develop and execute a business continuity or disaster recovery strategy based on leading practices promoted by CRISC and geared to align with your organization's risk tolerance, business objectives, and IT budget. Progent's CRISC-certified network risk management specialists offer a range of risk evaluation services such as:

  • Collect data and review documentation to evaluate major risk scenarios
  • Identify legal, regulatory, and business mandates and company standards associated with your network to determine their potential impact on your business objectives
  • Identify potential threats for your operational processes to assist in analyzing your enterprise risk
  • Create a risk awareness program and conduct training to make sure your stakeholders appreciate IT risk so they can contribute to your risk control program
  • Match key risk vectors to your associated business procedures to help determine risk responsibility
  • Validate risk tolerance with executive leadership and key stakeholders to make sure they align
Get the details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Accredited IS Security Consulting Services
Global Information Assurance Certification was established in 1999 to validate the knowledge of information technology security engineers. GIAC's mission is to make sure that an accredited security consultant has the skills necessary to provide support in important areas of system, information, and program security. GIAC accreditations are acknowledged by businesses and institutions throughout the world including and the U.S. National Security Agency (NSA). Progent's GIAC-certified network security audit experts are available to help your IT organization in the areas of:

  • Assessing Perimeters
  • Security Incident Handling
  • Traffic Analysis
  • Web-based Services Security
  • SIEM solutions
Find out more details concerning Progent's GIAC Information Assurance Services.

Contact a Certified Security Expert
To find out how to access a certified security consultant for online or on-premises expertise in California, phone 1-800-993-9400 or go to Remote Network Support.

© 2002- 2019 Progent Corporation. All rights reserved.