Company computer networks in the state of California can depend on fast and affordable online technical support from Progent's qualified security support specialists to resolve the toughest security issues. Rates are affordable, charges are by the minute, engagement is quick, and support is unbeatable. Progent also provides assistance for long-term projects that requires the expertise of seasoned security engineers with top industry credentials.

In case your California organization is based outside of major metropolitan neighborhoods like Los Angeles, San Diego, San Jose, San Francisco, Long Beach, Fresno, or Sacramento, the availability of nearby qualified network security professionals may be limited when you have an urgent situation. This can result in a loss of revenue for your business, angry customers, idle workers, and distracted management. By calling Progent's online services, you have access to a certified security consultant who can provide assistance when you need it to keep your network running and salvage your information.

Progent can assist you at any level in your initiatives to guard your IT environment with services that can range from network security assessments to creating a comprehensive security strategy. Progent provides affordable support to assist small and midsize companies to set up and maintain protected networks powered by Microsoft Windows and Cisco products and that may include computers based on UNIX or Linux platforms as well as BYOD users with Apple iPhones and iPads or Google Android or Windows Phone devices.

Progent can also assist you to outsource spam blocking and defense against email-borne assaults. Email Guard is Progent's email filtering and encryption platform that incorporates the services and infrastructure of leading data security vendors to provide web-based management and comprehensive protection for all your inbound and outbound email. The powerful structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local gateway appliance to provide advanced protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-based threats. Email Guard's cloud filter serves as a first line of defense and blocks most threats from making it to your security perimeter. This reduces your exposure to inbound threats and conserves system bandwidth and storage. Email Guard's onsite security gateway appliance provides a deeper level of analysis for incoming email. For outbound email, the on-premises gateway provides AV and anti-spam protection, protection against data leaks, and email encryption. The onsite security gateway can also assist Microsoft Exchange Server to track and protect internal email that originates and ends within your security perimeter.

Progent's security engineers are available remotely or in person to provide a range of emergency or longer-term computer security services which include:

If your business has an emergency requirement for IT security support, go to Progent's Urgent Online Technical Help.

Progent's consultants offer advanced support in key areas of network protection that include security evaluation, firewall/VPN support, and advanced security consulting.

System Security Assessment
Progent's certified security engineers can assess the vulnerability of your existing network security implementation through exhaustive remote automated analysis via sophisticated utilities and tested procedures. Progent's skill in this testing saves you time and money and assures a detailed portrayal of weaknesses. The information your company gains can form the foundation of a network protection plan that can allow your information system to run safely and react rapidly to future risks.

Automated Vulnerability Assessment
Progent provides consulting in the application of security evaluation software such as Microsoft Baseline Security Analyzer and LANguard from GFI for economically performing a variety of automatic system testing checks to uncover potential security vulnerabilities. Progent has extensive knowledge of other security analysis products including NMAP Port Scanner, AMAP, eEye Vulnerability Scanner, as well as tools like Metasploit, Netcat, Socat, and Nikto. Progent can help you to make sense of audit reports and react appropriately.

Progent can help you design security into your business processes, install auditing tools, define and implement a secure network environment, and suggest procedures to maximize the safety of your network. Progent's security consultants are able to assist you to set up a firewall, design secure remote connectivity to email and business applications, and integrate VPN. Learn more on Progent's automated security audits.

Security Inventory Service Bundles for Small Businesses
Progent offers two ultra-affordable security inventory packages intended to enable small companies to get a professional network security evaluation from an accredited security consultant. With Progent's External Network Security Inventory Scan, a security engineer administers a comprehensive examination of your network from beyond your company firewall to determine possible risks in the security profile you expose to the public. With Progent's Internal Network Security Inventory Scan, an engineer runs a system scan from a secure computer inside your firewall to uncover the risk to internal threats. The two security inventory packages are set up and run from a protected external site. The process is managed by an engineer who has earned top security accreditations and who generates a report that summarizes and interprets the information collected by the scan and proposes practical improvements where appropriate.

Network Intrusion Testing Support Services
Stealth intrusion testing is an important component of any successful network security plan. Progentís security professionals can run thorough penetration checks without the knowledge of your company's internal network support staff. Unannounced penetration testing uncovers whether current security monitoring tools such as intrusion detection alerts and event history monitoring are properly configured and actively monitored. Learn more on Progent's network security penetration testing consulting.

Firewalls and VPN Solutions
Progent's expertise in network security technology encompasses in-depth field work with major firewalls and VPN products from multiple vendors including Cisco, Microsoft, and Juniper. Progent offers the services of consultants who have earned key networking accreditations including CCIE and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Configuration and Troubleshooting
The current ASA 5500-X Family of firewalls with Firepower Services deliver substantially more bang for the buck than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX firewalls for new installations. Since Cisco's purchase of Sourcefire, the entire line of ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed intrusion protection system (IPS). Firepower services provide enhanced capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help your company to maintain your current PIX or ASA 5500 security appliances and upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your company to design, integrate, optimize, manage and debug firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Learn more details about Cisco ASA Firewalls with Firepower integration and troubleshooting services.

Cisco Security and Virtual Private Network Engineering Services
Cisco's network security and remote connection technology provide a full line of easy-to-administer security solutions to help safeguard your local and remote information system. Cisco's VPN product family features routers, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's professional consulting staff includes field-proven specialists with Cisco's CCIE and Cisco Certified Network Professional qualifications who are able to help your business to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that fit best with your business objectives. Read more details about Progent's Support Expertise for Cisco Security and VPN Appliances.

Engineering Services for Other Firewall and VPN Products
Progent offers small and mid-size companies professional consulting for Intrusion Protection products and IPsec VPN solutions from major firewall and Virtual Private Network security vendors including WatchGuard, Juniper, and Symantec. Progent can help you design a comprehensive security strategy and select the right products from multiple vendors to achieve your security goals while sticking within your spending limits.

Expert Network Security Design
Any business should have a carefully thought out security strategy that incorporates both proactive procedures and reaction planning. The proactive plan is a collection of steps intended to reduce vulnerabilities. The reactive plan helps your network security engineers to assess the damage caused by a security penetration, repair the damage, record the event, and get business functions operational as soon as feasible.

Progent's certified IT security consultants are available to help you to run a comprehensive risk assessment and define a network security plan to establish security policies and mechanisms to minimize future attacks and dangers.

CISM Accredited Information Security Support Expertise
The Certified Information Security Manager (CISM) committee defines the core capabilities and global standards of performance that IT security professionals are expected to master. CISM provides executive management the assurance that those who have qualified for their CISM credential have the experience and capability to deliver efficient security management and support consulting. Progent can provide the support of CISM qualified security professionals to assist companies with:

  • Network Security Governance
  • Risk Management
  • Network Security Program Management
  • Information Security Administration
  • Recovery Management
Learn more information about Progent's CISM Accredited Security Engineering Expertise.

CISSP Certified Security Engineering Assistance
The CISSP credential denotes mastery of a global standard for network security. The American National Standards Institute has awarded certification recognition in the area of information protection under ISO 17024. Progent offers the services of security professionals who have earned CISSP accreditation. Progent can provide a CISSP-certified consultant to help your organization in a broad range of security areas including:

  • Security Management Procedures
  • Security Infrastructure and Paradigms
  • Access Control Systems and Processes
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Cryptography Technology
  • Telecommunications, LAN and WAN Security
  • Business Continuity Planning
Read additional information concerning Progent's CISSP Accredited Information Security Support Expertise.

ISSAP Accredited Secure System Architecture Engineering Expertise
Progent's ISSAP qualified information system architecture professionals are consultants who have been awarded ISSAP status through thorough examination and significant work with information security architecture. The ISSAP credential indicates proven competence in the most in-depth requirements of IS security architecture within the wider scope of information system security expertise needed for CISSP certification. Progent's ISSAP-qualified security experts can assist your business with all aspects of architecture security including.

  • Access Control Systems and Techniques
  • Telecommunications and Network Infrastructure Protection
  • Data Encryption Solutions
  • Needs Evaluation and Security Criteria
  • Business Continuity Planning and DRP
  • Site Security
Find out additional information concerning Progent's ISSAP Qualified Secure System Architecture Support Professionals.

CISA Certified IS Security Auditing Consulting Support
The Certified Information Systems Auditor (CISA) credential is a prestigious qualification that indicates expertise in network security audit and control. Accredited by ANSI, the CISA credential requires that consultants undergo an extensive test administered by the ISACA international professional group. Progent's CISA-qualified security audit engineers are available to help your company in the areas of:

  • Information Systems Audit Services
  • IT Governance
  • Systems and Architecture Planned Useful Life
  • Information Technology Support
  • Safeguarding Data Resources
  • Business Continuity Preparedness
Learn additional information about Progent's CISA Certified Network Security Auditing Engineering Services.

Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC certification program was initiated by ISACA to validate a consultant's skills to plan, implement, and support IS control mechanisms to reduce network risk. Progent can provide the services of a CRISC-certified consultant to help you to create and carry out a business continuity or disaster recovery plan that follows industry best practices promoted by CRISC and geared to align with your organization's risk appetite, business objectives, and IT budget. Progent's CRISC-certified network risk mitigation consultants can provide a range of risk assessment services such as:

  • Gather information and review documentation to help identify significant risk scenarios
  • Inventory legal, industry, and business mandates and organizational standards related to your network to determine their possible impact on your business goals
  • Identify potential threats for your business workflows to help in analyzing your corporate risk
  • Create a risk awareness initiative and provide training to ensure your organization appreciate IT risk so they can contribute to your risk control process
  • Connect identified risk scenarios to your associated operational procedures to help determine risk responsibility
  • Validate risk appetite with your senior leadership and major stakeholders to ensure they match
Learn more information about Progent's CRISC Experts.

GIAC Certified IS Security Consulting Support
GIAC was founded in 1999 to certify the skill of IT security professionals. GIAC's mission is to verify that an accredited professional possesses the knowledge necessary to deliver support in critical categories of system, information, and application security. GIAC accreditations are acknowledged by companies and government organizations throughout the world including and the United States National Security Agency (NSA). Progent's GIAC information security audit experts can help your company with:

  • Assessing IT Infrastructure
  • Security Incident Response
  • Intrusion Detection
  • Web-based Application Security
  • SIEM solutions
Read additional details about Progent's GIAC Information Assurance Expertise.

Contact a Certified Progent Security Expert
To learn how to get in touch with a Progent security engineer for remote or on-premises help in California, phone 1-800-993-9400 or go to Remote Computer Help.














© 2002- 2017 Progent Corporation. All rights reserved.