Small business IT networks in California can depend on fast and economical remote access to Progent's accredited security engineers to help with the toughest security issues. The cost is reasonable, charges are by the minute, sign-up is immediate, and service is unbeatable. Progent also offers help for long-term projects that demand the services of seasoned security engineers with high-level security certifications.

In case your California business is based away from major metropolitan neighborhoods like Los Angeles, San Diego, San Jose, San Francisco, Long Beach, Fresno, or Sacramento, support from local certified network security engineers may be problematic during a security disaster. This can cause lost productivity for your company, angry clients, idle employees, and defocused management. By calling Progent, you can get in touch with a certified security professional ready to deliver help whenever you need it to keep your computer network operating and salvage your information.

Progent can help you at any level in your efforts to guard your information system with support services that can range from network security audits to developing a company-wide security plan. Progent provides affordable support to help businesses of all sizes to set up and maintain secure networks powered by Windows and Cisco products and that may include servers and desktops based on UNIX or Linux operating systems plus mobile clients with Apple iOS handhelds or Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam blocking and defense against email-borne assaults. Email Guard is Progent's email filtering and encryption solution that incorporates the services and infrastructure of leading information security vendors to provide web-based control and world-class security for your email traffic. The powerful architecture of Progent's Email Guard integrates cloud-based filtering with a local security gateway appliance to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne threats. The cloud filter acts as a first line of defense and blocks the vast majority of threats from making it to your security perimeter. This reduces your vulnerability to external threats and saves system bandwidth and storage. ProSight Email Guard's onsite gateway appliance provides a deeper level of inspection for inbound email. For outgoing email, the onsite gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The on-premises gateway can also enable Microsoft Exchange Server to monitor and safeguard internal email traffic that stays within your corporate firewall.

Progent's certified experts are available online or on site to offer a range of emergency or longer-term IT security services which include:

  • Run thorough network security audits
  • Clean up quickly after virus and worm attacks
  • Set up effective firewalls
  • Configure safe solutions for remote and mobile access
  • Install advanced solutions for automatic protection against viruses, spam and DHAs
  • Help create a company-wide security plan with 24x7 network monitoring
  • Provide outsourced Call Center Support
  • Help Develop a practical backup and restore solution based on Microsoft DPM automated backup capability
If your company has an emergency need for IT security support, go to Progent's Urgent Remote Technical Support.

Progent's support professionals offer world-class support in key fields of network security including analysis, firewall/VPN support, and advanced security planning.

System Evaluation
Progent's certified security consultants can assess the vulnerability of your current network protection implementation through exhaustive remote automated analysis based on sophisticated utilities and tested techniques. Progent's experience in this service saves your company money and offers an accurate portrayal of weaknesses. The information your IT organization is provided can form the basis of a security strategy that will permit your information system to run dependably and react quickly to future threats.

Automated Vulnerability Evaluation
Progent offers expertise in the application of security auditing software such as Microsoft Baseline Security Analyzer (MBSA) and LANguard from GFI for affordably performing a variety of automatic system auditing scans to uncover potential security holes. Progent has extensive experience with additional network auditing tools including NMAP Port Scanner, AMAP Application Scanner, eEye, plus tools like SolarWinds, Netcat, Hydra, and Nikto. Progent can show you how to make sense of testing reports and react effectively.

Progent can help you design security into your company processes, install auditing applications, define and deploy a secure system architecture, and suggest procedures to maximize the security of your IT system. Progent's security consultants are available to show you how to set up a firewall, design safe remote connectivity to email and data, and integrate virtual private network. Learn more concerning Progent's automated security evaluation.

Security Inventory Service Packages for Small Companies
Progent has put together two ultra-affordable security inventory service bundles intended to allow small companies to receive a professional network security assessment from a qualified security expert. With Progent's External Network Security Inventory Checkup, a security expert administers a comprehensive examination of your network from outside your firewalled perimeter to uncover possible risks in the security profile you expose to the public. With Progent's Internal Security Inventory Scan, a certified security professional executes a system scan from a secure computer inside your company firewall to determine your exposure to internal attacks. The two security inventory services are configured and executed from a protected external location. The project is overseen by a consultant with high-level security credentials and who generates a report that details and analyzes the information collected by the scan and proposes cost-effective improvements if called for.

Stealth Penetration Analysis Consulting
Stealth penetration testing is an important part of any comprehensive network security strategy. Progent’s security professionals can perform extensive penetration checks without the knowledge of your organization's internal IT resources. Stealth penetration checking shows whether current security monitoring systems such as intrusion incident warnings and event history monitoring are properly configured and consistently checked. Find out more on Progent's network security penetration analysis support services.

Firewall And Virtual Private Network (VPN) Support
Progent's background in security technology includes in-depth field work with major firewalls and Virtual Private Network (VPN) products offered by multiple companies such as Cisco, Microsoft, and Juniper. Progent can provide the services of consultants who have earned key industry certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Integration and Troubleshooting
The current Cisco ASA 5500-X Family of firewalls with Firepower Services deliver significantly more value than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new installations. Since Cisco's acquisition of Sourcefire, the whole line of ASA 5500-X firewalls can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular intrusion protection system (IPS). Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can assist your company to manage your existing PIX or Cisco ASA 5500 firewalls and upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your company to plan, integrate, tune, administer and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Read more information about ASA Firewalls with Firepower Services configuration and debugging support.

Cisco Network Security and Virtual Private Network Engineering Services
Cisco's security and offsite access products offer a full range of easy-to-administer security solutions to help protect your wired and wireless network infrastructure. Cisco's Virtual Private Network line features switches, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's expert staff of consultants includes field-proven engineers with Cisco CCIE and CCNP certifications who can assist your business to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that align best with your business goals. Learn additional information concerning Progent's Engineering Services for Cisco Security Technology and VPN Appliances.

Consulting Expertise for Additional Firewall and VPN Products
Progent offers small and medium size organizations professional support for Intrusion Protection products and IPsec VPN solutions from major firewall and VPN security vendors such as WatchGuard, Juniper, and SonicWALL. Progent can help you create a comprehensive security strategy and select appropriate technologies from multiple vendors to support your security objectives while staying within your spending limits.

Progent's Low-Cost Managed Services for Information Security
Progent's low-cost ProSight portfolio of network management outsourcing services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that incorporates next generation behavior-based analysis tools to defend endpoints as well as servers and VMs against new malware attacks such as ransomware and email phishing, which easily evade legacy signature-matching anti-virus products. ProSight Active Security Monitoring safeguards local and cloud-based resources and provides a unified platform to address the complete malware attack progression including filtering, detection, mitigation, cleanup, and forensics. Top features include single-click rollback with Windows Volume Shadow Copy Service and real-time network-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.

ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection managed services offer economical multi-layer security for physical servers and VMs, workstations, mobile devices, and Exchange Server. ProSight ESP utilizes contextual security and modern behavior analysis for continuously monitoring and reacting to security threats from all vectors. ProSight ESP offers firewall protection, penetration alerts, endpoint management, and web filtering through leading-edge tools packaged within one agent accessible from a single control. Progent's data protection and virtualization experts can assist you to design and implement a ProSight ESP environment that meets your company's specific needs and that allows you achieve and demonstrate compliance with government and industry information security regulations. Progent will help you specify and implement security policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alarms that call for immediate attention. Progent's consultants can also assist you to install and test a backup and restore system like ProSight Data Protection Services (DPS) so you can get back in business rapidly from a destructive cyber attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Microsoft Exchange filtering.

ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent provide small and medium-sized businesses an affordable end-to-end solution for secure backup/disaster recovery (BDR). For a fixed monthly cost, ProSight DPS automates and monitors your backup processes and enables fast restoration of vital data, apps and virtual machines that have become unavailable or corrupted due to component failures, software bugs, disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, apps, system images, as well as Hyper-V and VMware images. Important data can be protected on the cloud, to an on-promises device, or to both. Progent's BDR specialists can provide advanced support to set up ProSight Data Protection Services to to comply with government and industry regulatory standards like HIPPA, FINRA, and PCI and, when necessary, can assist you to recover your critical data. Read more about ProSight Data Protection Services Managed Backup and Recovery.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the technology of leading information security vendors to provide centralized management and comprehensive protection for your inbound and outbound email. The powerful architecture of Email Guard managed service integrates cloud-based filtering with a local gateway appliance to offer complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. Email Guard's Cloud Protection Layer acts as a preliminary barricade and keeps the vast majority of unwanted email from making it to your network firewall. This decreases your exposure to external threats and saves network bandwidth and storage space. Email Guard's on-premises gateway appliance adds a further layer of analysis for incoming email. For outgoing email, the on-premises security gateway provides anti-virus and anti-spam protection, protection against data leaks, and email encryption. The on-premises security gateway can also help Microsoft Exchange Server to track and protect internal email that originates and ends within your security perimeter. For more information, see Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and apps hosted in a protected Tier III data center on a high-performance virtual machine host configured and managed by Progent's IT support experts. Under the ProSight Virtual Hosting service model, the client owns the data, the operating system software, and the apps. Because the environment is virtualized, it can be ported easily to an alternate hardware environment without requiring a lengthy and difficult configuration procedure. With ProSight Virtual Hosting, your business is not tied one hosting service. Find out more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, update, find and protect information about your network infrastructure, procedures, applications, and services. You can quickly locate passwords or IP addresses and be warned automatically about upcoming expirations of SSL certificates or warranties. By cleaning up and managing your IT documentation, you can eliminate up to half of time thrown away trying to find critical information about your network. ProSight IT Asset Management includes a common location for holding and sharing all documents related to managing your business network like standard operating procedures and How-To's. ProSight IT Asset Management also offers advanced automation for gathering and associating IT information. Whether you’re making improvements, performing maintenance, or responding to a crisis, ProSight IT Asset Management gets you the information you need the instant you need it. Learn more about Progent's ProSight IT Asset Management service.

Expert Security Consulting
Every company should develop a thoroughly considered security program that includes both proactive processes and reaction planning. The proactive plan is a collection of procedures that help to reduce security weaknesses. The post-attack plan assists your security personnel to assess the damage caused by a security penetration, repair the damage, record the experience, and get the IT network running as rapidly as possible.

Progent's expert information security consultants can to help you to perform a full risk evaluation and define a computer security plan to implement security policies and controls to reduce future assaults and dangers.

CISM Certified Network Security Engineering Expertise
The Certified Information Security Manager (CISM) organization defines the basic capabilities and worldwide standards of performance that IT security professionals are expected to master. CISM gives business management the assurance that those who have qualified for their CISM certification have the background and knowledge to provide efficient security management and support consulting. Progent can provide the expertise of CISM qualified security professionals to assist companies with:

  • Information Security Governance
  • Risk Analysis
  • Information Security Program Management
  • Network Security Management
  • Recovery Planning
Find out more information about Progent's CISM Accredited Information Security Engineering Expertise.

CISSP Accredited Security Consulting Support
The CISSP credential denotes mastery of an international standard for information security. ANSI has awarded certification recognition in the field of data security defined by ISO/IEC 17024. Progent offers the services of security consultants who have qualified for CISSP certification. Progent can provide a CISSP-certified expert to help your organization in a variety security fields such as:

  • Security Administration Practices
  • Security Infrastructure and Paradigms
  • Access Control Solutions and Methodology
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Cryptography Technology
  • Telecom, LAN and WAN Security
  • Business Continuity Preparedness
Find out additional details about Progent's CISSP Qualified Network Security Consulting Professionals.

ISSAP Accredited Secure System Architecture Engineering Assistance
Progent's ISSAP qualified information system architecture engineers are experts who have earned ISSAP status through rigorous testing and significant experience with network security architecture. The ISSAP certification represents demonstrated mastery in the most complex demands of IS security architecture bounded by the wider field of information security knowledge needed for CISSP certification. Progent's ISSAP-qualified security consultants can help your business with all aspects of architecture security such as.

  • Access Control Mechanisms and Techniques
  • Phone System and Network Security
  • Data Encryption Options
  • Needs Evaluation and Security Guidelines
  • BCP and Disaster Recovery Planning (DRP)
  • Hardware Security
Learn more information about Progent's ISSAP Qualified Secure IT Architecture Support Services.

CISA Qualified IS Security Auditing Engineering Expertise
The Certified Information Systems Auditor credential is a globally recognized achievement that indicates expertise in information system security audit and control. Certified by the American National Standards Institute, the CISA credential has candidates undergo an extensive examination given by the ISACA professional association. Progent's CISA-qualified IS security audit consultants can help your business with:

  • IS Audit Process
  • Information Technology Administration
  • Network Assets and Infrastructure Planned Useful Life
  • IT Service Delivery
  • Safeguarding Information Assets
  • Business Continuity Planning
Learn the details concerning Progent's CISA Qualified Security Auditing Engineering Expertise.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA to verify an IT professional's ability to design, implement, and support information system control mechanisms to reduce risk. Progent can provide the expertise of a CRISC-certified consultant to help you to develop and execute a workplace continuity or disaster recovery strategy based on leading practices promoted by CRISC and crafted to match your company's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC-certified IT risk management engineers can provide a variety of risk identification services such as:

  • Gather data and review documentation to identify major risk scenarios
  • Identify statutory, regulatory, and business requirements and company standards related to your network to determine their possible impact on your business goals
  • Identify potential threats for your operational workflows to help in analyzing your enterprise risk
  • Develop a risk awareness initiative and conduct training to make sure your stakeholders appreciate IT risk so they can assist with your risk management program
  • Connect identified risk scenarios to your associated business processes to help determine risk responsibility
  • Validate risk tolerance with executive management and key stakeholders to make sure they are in agreement
Find out additional details about Progent's CRISC Consultants.

GIAC Accredited IS Security Engineering Assistance
GIAC was established in 1999 to certify the knowledge of network security experts. GIAC's goal is to verify that a certified security consultant possesses the knowledge necessary to deliver services in key categories of system, information, and application software security. GIAC accreditations are acknowledged by companies and institutions all over the world including and the U.S. NSA. Progent's GIAC network security audit specialists can help your IT organization with:

  • Auditing IT Infrastructure
  • Security Incident Response
  • Intrusion Detection
  • Web-based Services Security
  • SIEM solutions
Read more details concerning Progent's GIAC Information Assurance Support.

Talk to a Progent Security Engineer
To see how you can contact a certified security consultant for online or onsite help in California, phone 1-800-993-9400 or go to Online Network Help.














© 2002- 2018 Progent Corporation. All rights reserved.