Small business IT networks in California can depend on quick and affordable remote access to Progent's accredited security engineers to assist with urgent security problems. The cost is affordable, charges are by the minute, sign-up is fast, and support is world class. Progent also offers assistance for long-term engagements that requires the knowledge of senior security engineers with high-level security certifications.

In case your California small business is situated away from larger urban neighborhoods like Los Angeles, San Diego, San Jose, San Francisco, Long Beach, Fresno, or Sacramento, the availability of local qualified security engineers may be limited when you have a security disaster. This can cause a loss of revenue for your business, angry customers, unproductive workers, and distracted executives. By calling Progent, you can get in touch with a certified security professional ready to offer help whenever you need it to get your system running and salvage your information.

Progent can help you in your efforts to guard your network with support that ranges from security checks to developing a company-wide security strategy. Progent provides economical support to assist small and midsize companies to set up and manage protected networks powered by Windows and Cisco products and that can include servers and desktops based on UNIX or Linux operating systems as well as BYOD users with Apple iPhones and iPads or Android or Windows Phone handsets.

Progent can also show you how to outsource spam filtering and protection from e-mail-based security threats. Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of leading information security vendors to deliver centralized control and comprehensive protection for your email traffic. The hybrid structure of Email Guard managed service combines cloud-based filtering with an on-premises gateway appliance to provide complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The cloud filter serves as a first line of defense and blocks the vast majority of unwanted email from making it to your security perimeter. This decreases your exposure to external attacks and conserves system bandwidth and storage space. Email Guard's onsite gateway device provides a further level of inspection for incoming email. For outgoing email, the onsite security gateway provides AV and anti-spam protection, DLP, and encryption. The local gateway can also help Exchange Server to monitor and safeguard internal email traffic that stays within your corporate firewall.

Progent's certified engineers are accessible online or on premises to provide a range of emergency or longer-term IT security services such as:

If your business has an emergency need for IT security support, refer to Progent's Emergency Online Technical Help.

Progent's engineers can deliver world-class services in key areas of computer security that include security assessment, firewalls and VPN, and high-level security planning.

System Assessment
Progent's expert security consultants can evaluate the strength of your existing network security systems through comprehensive remote automated testing via sophisticated utilities and tested techniques. Progent's skill in administering this service saves your company money and assures an objective picture of security holes. The information your business is provided can make up the foundation of a network protection plan that will allow your information system to operate safely and adapt rapidly to future threats.

Automated Network Vulnerability Analysis
Progent offers consulting in the use of security auditing software such as MBSA and LANguard from GFI for affordably performing a set of programmed system testing scans to uncover potential security gaps. Progent has broad experience with additional security analysis products including NMAP Port Scanner, AMAP, eEye, plus utilities such as Metasploit, Netcat, and Nikto. Progent can help you to understand audit reports and react effectively.

Progent can help you design security into your business processes, configure scanning applications, define and implement a protected system architecture, and suggest policies to maximize the safety of your IT system. Progent's security consultants are ready to show you how to set up a firewall, design safe remote connectivity to email and business applications, and install virtual private network. Learn more on Progent's network security evaluation.

Security Inventory Packages for Small Companies
Progent offers two ultra-affordable security inventory service packages designed to allow small businesses to get an objective network security evaluation from a certified security engineer. With Progent's External Security Inventory Checkup, a security expert runs a comprehensive examination of your network from beyond your firewall to uncover potential risks in the security profile you expose to the public. With Progent's Internal Network Security Inventory Checkup, an engineer executes a network scan from an authorized machine within your company firewall to assess vulnerabilities to internal threats. The two security inventory services are configured and run from a protected remote site. The project is managed by a consultant with high-level security accreditations and who generates a report that summarizes and interprets the information captured by the security scan and proposes cost-effective improvements where called for.

Stealth Intrusion Testing Support Services
Stealth intrusion checking is an important component of any serious network security plan. Progentís security professionals can perform extensive penetration tests without the awareness of your company's in-house network support staff. Stealth penetration testing shows whether current security monitoring systems such as intrusion detection warnings and event log analysis are properly configured and consistently monitored. Find out additional information concerning Progent's network penetration analysis consulting.

Firewall and Virtual Private Network Support
Progent's expertise in network security technology encompasses in-depth field work with major firewalls and Virtual Private Network (VPN) products offered by multiple companies including Cisco, Microsoft, and CheckPoint. Progent can provide the services of consultants with key industry certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Debugging
The new ASA 5500-X Series of firewalls with Firepower Services deliver significantly more bang for the buck than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 security appliances for new installations. Following Cisco's acquisition of Sourcefire, the whole family of Cisco ASA 5500-X devices can be configured to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed network intrusion protection system (IPS). Firepower services provide enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can assist your company to manage your legacy PIX or Cisco ASA 5500 security appliances and migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite help with ASA 5500-X firewalls with Firepower Services and can help your business to design, deploy, optimize, manage and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Learn more details about Cisco ASA Firewalls with Firepower configuration and troubleshooting services.

Cisco Network Security and Virtual Private Network Support Services
Cisco's network security and remote access products offer a complete range of easy-to-administer security solutions to help safeguard your local and remote information system. Cisco's Virtual Private Network product family includes switches, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's expert consulting staff includes experienced engineers with Cisco CCIE and CCNP certifications who are able to help your organization to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that align most closely with your business objectives. Learn more information concerning Progent's Consulting Services for Cisco Security and Virtual Private Network Appliances.

Consulting Expertise for Additional Firewall and VPN Solutions
Progent provides small and medium size businesses professional consulting for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and VPN security companies including WatchGuard, Juniper, and Symantec. Progent can help you design a comprehensive security strategy and choose appropriate technologies from multiple suppliers to achieve your security objectives while staying within your spending restraints.

Certified Network Security Consulting
Any business should have a thoroughly thought out security program that includes both preventive processes and response plans. The proactive strategy is a collection of steps that help to reduce vulnerabilities. The post-attack plan helps your security engineers to assess the impact caused by a security penetration, fix the system, document the experience, and get business functions operational as quickly as feasible.

Progent's certified information security engineers are available to help your business to run a comprehensive vulnerability assessment and create a network security strategy to implement security processes and controls to mitigate ongoing assaults and dangers.

CISM Qualified Security Consulting Expertise
The Certified Information Security Manager (CISM) organization defines the basic capabilities and international standards of skill that IT security professionals are expected to learn. It gives business management the assurance that consultants who have qualified for their CISM certification have the background and capability to provide efficient security management and support consulting. Progent can provide the services of CISM certified security professionals to help companies with:

  • IS Security Processes
  • Risk Analysis
  • Information Security Program Management
  • IS Security Management
  • Response Planning
Read more information about Progent's CISM Qualified Security Consulting Services.

CISSP Accredited Security Consulting Assistance
The CISSP credential recognizes expertise with an international standard for network security. ANSI (American National Standards Institute) has granted the CISSP credential recognition in the area of data security defined by ISO/IEC 17024. Progent can provide the services of security consultants who have qualified for CISSP certification. Progent can give you access to a CISSP-certified consultant to help your enterprise in a broad range of security fields such as:

  • Security Administration Procedures
  • Security Architecture and Models
  • Access Control Systems and Processes
  • Applications Development Security
  • Operations Security
  • Site Security
  • Data Encryption Mechanisms
  • Telecom, LAN and Internet Security
  • Business Continuity Preparedness
Read additional details about Progent's CISSP Qualified Network Security Engineering Services.

ISSAP Certified Secure Network Architecture Engineering Assistance
Progent's ISSAP certified network architecture professionals are experts who have earned ISSAP Certification as a result of rigorous examination and extensive work with network security architecture. The Information System Security Architecture Professional (ISSAP) credential represents proven skill in the most complex requirements of information security architecture within the wider field of IS security knowledge needed for CISSP accreditation. Progent's ISSAP-certified security consultants can assist your company with all phases of architecture security such as.

  • Access Control Mechanisms and Techniques
  • Telecom and Network Protection
  • Data Encryption Options
  • Needs Evaluation and Security Criteria
  • Business Continuity Planning and Disaster Recovery Planning
  • Hardware Security
Find out additional information about Progent's ISSAP Qualified Secure IT Architecture Engineering Services.

CISA Accredited IS Security Auditing Engineering Expertise
The CISA accreditation is an important qualification that indicates expertise in IS security auditing. Certified by the American National Standards Institute (ANSI), the CISA credential has consultants pass an extensive examination administered by the ISACA international professional group. Progent's CISA-certified information security audit consultants can help your IT organization in the areas of:

  • IS Audit Services
  • Information Technology Enforcement
  • Network Assets and Architecture Lifecycle
  • IT Service Delivery
  • Safeguarding Information Assets
  • Disaster Recovery Preparedness
Get additional information concerning Progent's CISA Certified Information System Security Auditing Engineering Services.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA in 2010 to verify an IT professional's skills to plan, implement, and maintain information system control mechanisms to mitigate network risk. Progent offers the expertise of a CRISC-certified consultant to help your company to develop and execute a workplace continuity plan that follows leading practices promoted by CRISC and crafted to match your company's risk tolerance, business goals, and IT budget. Progent's CRISC-qualified network risk management experts can provide a range of risk identification services such as:

  • Collect information and study documentation to evaluate significant risk scenarios
  • Inventory legal, regulatory, and business mandates and organizational standards related to your information system to determine their potential impact on your strategic goals
  • Identify potential threats for your business workflows to assist in evaluating your corporate risk
  • Create a risk awareness program and conduct seminars to make sure your organization understand information system risk so they can contribute to your risk control process
  • Match identified risk vectors to related business processes to help determine risk ownership
  • Validate risk tolerance with your senior leadership and key stakeholders to make sure they align
Find out the details concerning Progent's CRISC Consultants.

GIAC Qualified Security Engineering Support
GIAC (Global Information Assurance Certification) was established in 1999 to certify the skill of information technology security engineers. GIAC's mission is to ensure that an accredited professional has the knowledge necessary to deliver support in vital categories of network, information, and software security. GIAC accreditations are acknowledged by companies and government organizations throughout the world including and the United States National Security Agency (NSA). Progent's GIAC-qualified security audit experts can assist your IT organization in the areas of:

  • Assessing Security Systems
  • Security Incident Handling
  • Traffic Analysis
  • Web-based Application Security
  • SIEM solutions
Read additional information about Progent's GIAC Information Assurance Support.

Get in Touch with a Progent Security Expert
To see how to access a Progent security engineer for online or on-premises expertise in California, phone 1-800-993-9400 or go to Online Computer Help.

© 2002- 2017 Progent Corporation. All rights reserved.