Small business networks in California can have fast and affordable remote help from Progent's accredited security consultants to assist with critical security issues. Rates are competitive, charges are by the minute, sign-up is fast, and service is unbeatable. Progent also offers assistance for complex engagements that requires the knowledge of seasoned security engineers with high-level security credentials.

In case your California office is some distance from major urban neighborhoods like Los Angeles, San Diego, San Jose, San Francisco, Long Beach, Fresno, or Sacramento, contact with local certified security experts is often limited when there's an emergency. This could mean a drop in revenue for your business, angry clients, unproductive employees, and distracted executives. By contacting Progent's remote support, you have access to a qualified security engineer who can provide help when you need it to get your system operating and salvage your data.

Progent can help you in a variety of ways in your initiatives to protect your information system with support that ranges from network security checks to developing a comprehensive security strategy. Progent provides economical service to help businesses of all sizes to configure and manage secure IT environments powered by Microsoft Windows and Cisco products and that can include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X operating systems plus BYOD users with Apple iPhones and iPads or Google Android or Windows Phone handsets.

Progent can also show you how to outsource spam filtering and defense against e-mail-based security threats. Email Guard is Progent's email security solution that uses the services and infrastructure of leading information security companies to deliver centralized control and comprehensive security for your inbound and outbound email. The powerful architecture of Email Guard managed service combines cloud-based filtering with a local security gateway device to provide complete protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne malware. The Cloud Protection Layer acts as a first line of defense and blocks most threats from making it to your network firewall. This reduces your vulnerability to external attacks and conserves network bandwidth and storage space. Email Guard's onsite gateway appliance adds a further level of analysis for incoming email. For outbound email, the local security gateway offers anti-virus and anti-spam protection, DLP, and encryption. The on-premises security gateway can also help Microsoft Exchange Server to track and safeguard internal email that originates and ends inside your corporate firewall.

Progent's security engineers are accessible online or in person to offer a variety of urgent or project-based network security services such as:

If your business has an urgent need for IT security support, go to Progent's Emergency Remote Network Support.

Progent's consultants provide world-class services in key fields of system protection that include analysis, firewall and VPN expertise, and high-level security consulting.

System Security Audits
Progent's expert security engineers can evaluate the strength of your existing computer security implementation through comprehensive remote automated testing based on sophisticated software tools and proven procedures. Progent's experience in administering this testing saves you time and money and assures a detailed portrayal of system vulnerability. The information your IT organization gains can form the basis of a security strategy that can permit your network to run safely and react quickly to new threats.

Automated Security Analysis
Progent offers expertise in the use of security auditing packages including Microsoft Baseline Security Analyzer and GFI LANguard NSS for economically performing a variety of automatic network auditing checks to identify potential security holes. Progent has broad knowledge of other security analysis products such as NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, as well as tools like Metasploit Framework, Netcat, and Nikto. Progent can help you to make sense of audit reports and respond effectively.

Progent can show you how to design protection into your company operations, configure auditing tools, define and implement a protected network environment, and suggest procedures to optimize the security of your network. Progent's security consultants are ready to help you set up a firewall, design safe remote connectivity to email and data, and integrate VPN. Learn more concerning Progent's network security audits.

Security Inventory and Evaluation Packages for Small Businesses
Progent has put together two ultra-affordable security inventory and evaluation bundles intended to allow small businesses to receive a professional network security assessment from a certified security specialist. With Progent's External Security Inventory Scan, an engineer administers a comprehensive examination of your network from beyond your firewalled perimeter to uncover possible risks in the security posture you expose to the outside world. With Progent's Internal Network Security Inventory Scan, a security expert executes a network scan from an authorized computer within your company firewall to evaluate your exposure to inside attacks. Both security inventory packages are configured and executed from a secured remote location. The project is overseen by a consultant with top security accreditations and who produces a document that summarizes and interprets the data collected by the scan and suggests cost-effective improvements if called for.

Network Security Penetration Testing Support Services
Stealth intrusion checking is an important part of any successful network security strategy. Progentís security professionals can perform thorough penetration checks without the awareness of your company's in-house network support staff. Stealth penetration testing shows whether current security defense tools such as intrusion detection alerts and event history monitoring are properly configured and actively checked. Find out additional information concerning Progent's network security penetration analysis support services.

Firewall And Virtual Private Network (VPN) Support
Progent's background in network security solutions encompasses in-depth field work with leading firewalls and Virtual Private Network (VPN) products from a variety of companies including Cisco, Microsoft, and Symantec. Progent offers the services of engineers who have earned key industry certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Integration and Debugging
The new Cisco ASA 5500-X Series of firewalls with Firepower Services offer substantially more bang for the buck than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX firewalls for all new deployments. After Cisco's acquisition of Sourcefire, the whole family of Cisco ASA 5500-X firewalls can be configured to support Firepower Services, based on Sourcefire's Snort technology, which is the world's most deployed intrusion protection system (IPS). Firepower services bring powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can assist you to manage your legacy PIX or ASA 5500 security appliances or migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your company to design, integrate, tune, manage and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about Cisco ASA Firewalls with Firepower Services integration and troubleshooting services.

Cisco Security and VPN Consulting Expertise
Cisco's security and remote connection technology offer a full range of manageable security products to help safeguard your local and remote network infrastructure. Cisco's VPN line features switches, firewalls, intrusion detection devices and VPN concentrators. Progent's professional consulting staff includes field-proven engineers with Cisco's CCIE and CCNP qualifications who are able to help your organization to select Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that align most closely with your business goals. Find out more details about Progent's Support Services for Cisco Security Technology and Virtual Private Network Appliances.

Consulting Expertise for Other Firewall and Virtual Private Network Solutions
Progent provides small and medium size organizations professional support for Intrusion Protection Systems and IPsec VPN technology from major firewall and VPN security companies including Check Point Software, Juniper Networks, and SonicWALL. Progent can show you how to create a detailed security plan and select appropriate technologies from multiple suppliers to support your security goals while staying within your spending restraints.

Progent's Low-Cost Managed Services for Information Assurance
Progent offers a portfolio of affordable, fixed-price monthly managed services intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services available from Progent include:
Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
Email Guard is Progent's email filtering and encryption platform that uses the technology of leading information security companies to provide centralized management and comprehensive security for your inbound and outbound email. The hybrid structure of Progent's Email Guard integrates cloud-based filtering with an on-premises gateway appliance to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. Email Guard's Cloud Protection Layer serves as a preliminary barricade and blocks the vast majority of threats from making it to your security perimeter. This decreases your exposure to inbound attacks and saves network bandwidth and storage. Email Guard's onsite security gateway appliance provides a further level of analysis for inbound email. For outgoing email, the local gateway provides anti-virus and anti-spam protection, protection against data leaks, and email encryption. The on-premises security gateway can also help Exchange Server to track and safeguard internal email that stays inside your security perimeter. Find out more about Progent's Email Guard Spam Filtering, Virus Blocking, Content Filtering and Data Loss Prevention.

ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection solution that incorporates cutting edge behavior machine learning tools to defend endpoints as well as physical and virtual servers against modern malware assaults like ransomware and file-less exploits, which easily escape legacy signature-based anti-virus products. ProSight Active Security Monitoring protects on-premises and cloud-based resources and provides a single platform to automate the entire malware attack lifecycle including blocking, infiltration detection, containment, cleanup, and forensics. Key features include single-click rollback with Windows VSS and real-time network-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring Endpoint Protection and Ransomware Recovery.

ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent offer small and medium-sized businesses a low cost and fully managed solution for reliable backup/disaster recovery (BDR). For a low monthly cost, ProSight DPS automates your backup processes and enables rapid restoration of vital data, apps and VMs that have become lost or damaged due to component breakdowns, software glitches, disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to a local device, or to both. Progent's backup and recovery specialists can deliver world-class expertise to configure ProSight DPS to be compliant with regulatory requirements like IPPA, FIRPA, and PCI and, when needed, can assist you to recover your business-critical information. Find out more about ProSight DPS Managed Cloud Backup.

Expert Security Consulting
Every company ought to develop a thoroughly thought out security program that includes both pre-attack procedures and response plans. The proactive strategy is a collection of mechanisms intended to minimize vulnerabilities. The reactive plan assists your company's IT security personnel to evaluate the damage resulting from a security penetration, repair the system, record the event, and get business functions operational as rapidly as feasible.

Progent's expert IS security engineers can to help your business to run a complete risk evaluation and define a computer security plan to implement security processes and controls to minimize ongoing attacks and threats.

CISM Qualified Information Security Consulting Services
The Certified Information Security Manager (CISM) committee defines the basic competencies and worldwide standards of performance that IT security professionals are expected to learn. CISM provides business management the confidence that consultants who have qualified for their CISM certification have the background and knowledge to provide efficient security administration and support services. Progent can provide the services of CISM qualified security professionals to help businesses with:

  • Information Security Governance
  • Risk Management
  • IS Security Implementation Management
  • Network Security Management
  • Response Planning
Learn more information about Progent's CISM Network Security Support Expertise.

CISSP Accredited Security Consulting Support
CISSP recognizes mastery of a global standard for network security. The American National Standards Institute has granted certification accreditation in the field of data security stipulated by ISO 17024. Progent offers access to of security consultants who have qualified for CISSP accreditation. Progent can provide a CISSP-certified expert to help your organization in a variety security areas such as:

  • Security Management Procedures
  • Security Infrastructure and Paradigms
  • Access Control Solutions and Methodology
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Data Encryption Technology
  • Telecom, LAN and WAN Security
  • Business Continuity Planning
Find out more information concerning Progent's CISSP Accredited Network Security Consulting Professionals.

ISSAP Qualified Secure Information System Architecture Consulting Support
Progent's ISSAP qualified system architecture professionals are consultants who have been awarded ISSAP status through thorough examination and extensive experience with information security design. The ISSAP certification indicates proven mastery in the most complex requirements of IS security architecture bounded by the broader field of information security knowledge required for CISSP accreditation. Progent's ISSAP-qualified security specialists can assist your company with all aspects of architecture security including.

  • Access Control Mechanisms and Techniques
  • Phone System and Network Protection
  • Cryptography Options
  • Requirements Evaluation and Security Guidelines
  • Business Continuity Planning (BCP) and Disaster Recovery Planning
  • Site Security
Read additional information about Progent's ISSAP Certified Secure Information System Architecture Engineering Professionals.

CISA Certified IS Security Auditing Engineering Support
The Certified Information Systems Auditor (CISA) accreditation is a recognized qualification that indicates expertise in information system security auditing. Certified by the American National Standards Institute, the CISA credential requires that candidates undergo an extensive test administered by the ISACA international professional association. Progent's CISA security audit specialists are available to assist your IT organization with:

  • Information Systems Audit Process
  • IT Administration
  • Network Assets and Infrastructure Lifecycle
  • IT Support
  • Safeguarding Data Resources
  • Business Continuity Preparedness
Learn additional details concerning Progent's CISA Accredited Information System Security Auditing Engineering Services.

Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC program was established by ISACA in 2010 to verify an IT professional's ability to design, implement, and support information system control mechanisms to reduce network risk. Progent offers the services of a CRISC-certified engineer to help your company to create and execute a workplace continuity or disaster recovery plan that follows leading practices promoted by CRISC and crafted to match your company's risk appetite, business objectives, and IT budget. Progent's CRISC-certified network risk mitigation engineers can provide a variety of risk identification services such as:

  • Gather data and review documentation to help identify major vulnerabilities
  • Inventory statutory, regulatory, and contractual mandates and company policies associated with your information system to determine their potential influence on your business objectives
  • Point out possible vulnerabilities for your business processes to help in evaluating your enterprise risk
  • Create a risk awareness initiative and provide seminars to make sure your organization understand IS risk so they can contribute to your risk management program
  • Connect identified risk scenarios to your associated business procedures to help assign risk responsibility
  • Validate risk appetite with your senior leadership and major stakeholders to make sure they align
Find out additional details about Progent's CRISC Consultants.

GIAC Qualified Security Consulting Services
GIAC was founded in 1999 to certify the skill of computer security engineers. GIAC's goal is to verify that a certified security consultant has the knowledge needed to deliver services in critical categories of network, information, and application program security. GIAC certifications are acknowledged by businesses and institutions around the world including and the U.S. National Security Agency. Progent's GIAC security audit experts are available to assist your company in the areas of:

Read additional information concerning Progent's GIAC Information Assurance Expertise.

Talk to a Certified Security Expert
To find out how you can access a certified security consultant for online or on-premises help in California, call 1-800-993-9400 or visit Online Network Support.

© 2002- 2017 Progent Corporation. All rights reserved.