Company computer networks in the state of California can have prompt and economical online technical support from Progent's qualified network security support specialists to resolve critical security problems. Rates are competitive, charges are by the minute, engagement is fast, and support is unbeatable. Progent also offers assistance for complex projects that requires the services of seasoned security consultants with high-level security credentials.

In case your California business is some distance from larger urban areas including Los Angeles, San Diego, San Jose, San Francisco, Long Beach, Fresno, or Sacramento, support from local certified security experts could be limited when there's a crisis. This could mean a drop in revenue for your company, angry customers, idle employees, and distracted management. By calling Progent, you have access to a certified security consultant who can provide assistance when you have to have it to keep your network operating and restore your information.

Progent can assist you in a variety of ways in your initiatives to defend your IT environment with support that can range from network security checks to creating a company-wide security strategy. Progent offers affordable support to help businesses of all sizes to set up and maintain secure IT environments based on Microsoft Windows and Cisco technology and that can include servers and desktops running UNIX, Linux, Solaris, or Apple Mac OS X platforms as well as mobile clients with Apple iOS handhelds or Android or Windows Phone devices.

Progent can also show you how to outsource spam filtering and defense against email-borne attacks. Email Guard is Progent's email filtering and encryption solution that uses the technology of top data security vendors to provide centralized control and comprehensive security for your inbound and outbound email. The hybrid structure of Progent's Email Guard combines cloud-based filtering with an on-premises gateway device to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne threats. The Cloud Protection Layer acts as a first line of defense and keeps most unwanted email from reaching your network firewall. This decreases your exposure to external threats and saves system bandwidth and storage space. Email Guard's onsite gateway appliance adds a further layer of analysis for inbound email. For outgoing email, the on-premises gateway provides anti-virus and anti-spam protection, protection against data leaks, and email encryption. The onsite gateway can also assist Exchange Server to monitor and protect internal email traffic that originates and ends inside your corporate firewall.

Progent's security professionals are accessible remotely or on site to provide a variety of emergency or project-based network security services including:

If your network has an immediate need for IT security support, refer to Progent's Urgent Online Network Support.

Progent's consultants offer world-class support in vital facets of system protection including security assessment, firewall and VPN expertise, and high-level security consulting.

Security Assessment
Progent's expert security engineers can evaluate the effectiveness of your existing computer security implementation through comprehensive remote automated analysis via sophisticated software tools and proven procedures. Progent's experience in this service saves you money and assures an accurate picture of system vulnerability. The knowledge your IT organization gains can make up the basis of a security plan that can permit your network to run safely and respond rapidly to future risks.

Automated Network Security Assessment
Progent offers expertise in the use of security evaluation products such as Microsoft Baseline Security Analyzer and LANguard from GFI for affordably running a variety of programmed system testing checks to uncover possible security problems. Progent has broad experience with additional network analysis products including NMAP Port Scanner, AMAP, eEye, as well as tools such as Metasploit, Netcat, Hydra, and Nikto. Progent can help you to understand testing reports and respond effectively.

Progent can help you design security into your company processes, configure auditing software, plan and implement a protected system architecture, and suggest procedures to optimize the security of your IT system. Progent's security engineers are available to show you how to configure a firewall, design secure remote access to email and business applications, and install virtual private network. Learn additional information concerning Progent's automated security analysis.

Security Inventory Bundles for Small Companies
Progent has put together two low-cost security inventory packages designed to enable small businesses to receive an impartial security assessment from an accredited security specialist. With Progent's External Security Inventory Scan, a security engineer runs a comprehensive examination of your network from outside your firewall to uncover potential risks in the security profile you expose to the outside world. With Progent's Internal Security Inventory Checkup, a security engineer runs a system scan from an authorized computer within your firewall to assess vulnerabilities to inside threats. The two security inventory packages are set up and executed from a protected remote location. The project is directed by an engineer who has earned high-level security accreditations and who generates a document that details and interprets the information collected by the security scan and proposes cost-effective improvements where appropriate.

Stealth Intrusion Analysis Support Services
Stealth penetration checking is a key part of any successful network security plan. Progentís security experts can run thorough penetration tests without the knowledge of your organization's internal network support staff. Stealth penetration testing shows whether current security defense tools such as intrusion incident alerts and event log analysis are properly configured and actively monitored. Learn additional information concerning Progent's stealth penetration analysis consulting.

Firewall And Virtual Private Network (VPN) Solutions
Progent's expertise in security solutions encompasses extensive familiarity with major firewalls and Virtual Private Network technology from a variety of vendors such as Cisco, Microsoft, and Juniper. Progent offers the services of consultants who have earned key networking accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Troubleshooting
The new ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide substantially more performance than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX firewalls for new installations. Following Cisco's purchase of Sourcefire, the whole line of ASA 5500-X devices can be configured to support Firepower Services, built on Sourcefire's Snort technology, which is the market's most popular network intrusion protection system (IPS). Firepower services provide powerful new features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can assist you to manage your existing PIX or Cisco ASA 5500 firewalls and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite support for ASA 5500-X firewalls with Firepower Services and can help your company to plan, deploy, optimize, administer and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about Cisco ASA 5500-X Firewalls with Firepower integration and troubleshooting services.

Cisco Network Security and Virtual Private Network Support Expertise
Cisco's security and offsite access technology provide a complete line of easy-to-administer security solutions to help protect your local and remote information system. Cisco's VPN line includes routers, firewalls, intrusion detection systems and VPN concentrators. Progent's expert consulting staff includes field-proven specialists with Cisco's Certified Internetwork Expert and CCNP qualifications who can help your business to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that align best with your business goals. Find out more information concerning Progent's Consulting Expertise for Cisco Security and VPN Products.

Consulting Expertise for Additional Firewall and VPN Technology
Progent provides small and medium size companies professional support for Intrusion Protection products and IPsec VPN technology from leading firewall and VPN security companies including Check Point Software, Juniper Networks, and SonicWALL. Progent can help you design a comprehensive security strategy and select the right technologies from multiple vendors to support your security goals while sticking within your spending restraints.

Expert Network Security Planning
Every business should develop a thoroughly thought out security strategy that includes both proactive processes and response planning. The pre-attack plan is a collection of steps intended to minimize vulnerabilities. The post-attack plan helps your security engineers to evaluate the damage resulting from an attack, fix the network, record the event, and get the IT network operational as soon as feasible.

Progent's certified IT security engineers can to assist your business to run a comprehensive risk evaluation and define a company-wide security plan to implement security processes and mechanisms to minimize ongoing attacks and threats.

CISM Accredited Information Security Consulting Services
The Certified Information Security Manager (CISM) committee describes the basic competencies and international standards of performance that IT security managers are required to learn. It gives executive management the assurance that those who have earned their CISM certification have the experience and capability to deliver effective security management and support services. Progent offers the support of CISM qualified security professionals to assist companies with:

  • IS Security Processes
  • Risk Analysis
  • IS Security Implementation Management
  • IS Security Management
  • Recovery Planning
Find out additional information concerning Progent's CISM Accredited Information Security Consulting Expertise.

CISSP Qualified Security Consulting Services
CISSP denotes mastery of a worldwide standard for data security. The American National Standards Institute has granted certification recognition in the area of data protection under ISO/IEC 17024. Progent can provide access to of security experts who have earned CISSP accreditation. Progent can provide a CISSP-certified professional to help your company in a broad range of security areas including:

  • Security Administration Practices
  • Security Infrastructure and Paradigms
  • Access Control Solutions and Processes
  • Applications Development Security
  • Secure Operations
  • Site Security
  • Encryption/Decryption Mechanisms
  • Telecommunications, LAN and WAN Security
  • Business Continuity Preparedness
Learn more details concerning Progent's CISSP Accredited Network Security Support Professionals.

ISSAP Accredited Secure Information System Architecture Consulting Support
Progent's ISSAP certified system architecture engineers are consultants who have earned ISSAP status through thorough examination and extensive experience with information security architecture. The Information System Security Architecture Professional (ISSAP) credential indicates proven skill in the more in-depth demands of information security architecture within the wider scope of information security expertise required for CISSP certification. Progent's ISSAP-qualified security experts can assist your business with all phases of secure network architecture such as.

  • Access Management Systems and Techniques
  • Telecom and System Infrastructure Protection
  • Encryption/Decryption Solutions
  • Requirements Evaluation and Security Criteria
  • Business Continuity Planning (BCP) and Disaster Recovery Planning
  • Hardware Security
Learn additional information about Progent's ISSAP Qualified Secure IT Architecture Consulting Expertise.

CISA Qualified Security Auditing Engineering Support
The CISA credential is a globally recognized achievement that represents expertise in information system security auditing. Accredited by the American National Standards Institute, the CISA credential has candidates pass an extensive examination administered by the ISACA international professional association. Progent's CISA-qualified IS security audit engineers can help your IT organization in the areas of:

  • IS Audit Process
  • Information Technology Governance
  • Systems and Infrastructure Lifecycle
  • Information Technology Service Delivery
  • Protecting Information Assets
  • Disaster Recovery Preparedness
Get the details concerning Progent's CISA Certified Security Auditing Engineering Support.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC program was initiated by ISACA to validate an IT professional's ability to plan, deploy, and maintain information system control mechanisms to mitigate network risk. Progent offers the services of a CRISC-certified engineer to assist you to develop and execute a business continuity plan that follows industry best practices identified by CRISC and geared to match your company's risk tolerance, business objectives, and IT budget. Progent's CRISC-qualified IT risk mitigation consultants offer a variety of risk identification services including:

  • Gather data and review documentation to evaluate significant risk scenarios
  • Identify statutory, regulatory, and business requirements and organizational policies related to your information system to assess their possible impact on your strategic goals
  • Identify possible vulnerabilities for your business processes to help in evaluating your enterprise risk
  • Develop a risk awareness program and provide training to make sure your organization understand IS risk so they can assist with your risk control program
  • Match key risk vectors to related operational procedures to help assign risk ownership
  • Determine risk appetite with executive management and key stakeholders to make sure they are in agreement
Get additional details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Qualified Information System Security Consulting Services
GIAC (Global Information Assurance Certification) was established in 1999 to certify the knowledge of network security experts. GIAC's mission is to verify that a certified professional has the skills necessary to provide support in critical categories of network, information, and application program security. GIAC certifications are acknowledged by businesses and government organizations all over the world including and the U.S. National Security Agency (NSA). Progent's GIAC-certified network security audit experts can assist your company in the areas of:

  • Assessing Networks
  • Security Incident Handling
  • Intrusion Detection
  • Web Application Security
  • SIEM solutions
Read additional details concerning Progent's GIAC Information Assurance Support.

Talk to a Progent Security Engineer
To find out how to contact a Progent security consultant for online or onsite support in California, phone 1-800-993-9400 or go to Remote Network Help.














© 2002- 2017 Progent Corporation. All rights reserved.