Company computer networks in the state of California can now get fast and economical remote access to Progent's qualified security professionals to resolve urgent security problems. Rates are reasonable, billing is per minute, engagement is quick, and service is world class. Progent also offers help for long-term engagements that demand the services of senior security consultants with high-level industry credentials.

In case your California network is situated outside of major urban areas like Los Angeles, San Diego, San Jose, San Francisco, Long Beach, Fresno, or Sacramento, contact with local accredited security engineers is often limited during an urgent situation. This can result in a loss of income for your business, angry customers, idle employees, and defocused executives. By calling Progent, you can get in touch with a qualified security professional who can provide help whenever you require it to keep your information system running and salvage your information.

Progent can assist you in your initiatives to guard your network with support services that ranges from network security audits to developing a comprehensive security strategy. Progent offers affordable service to help companies of any size to design and maintain secure IT environments based on Microsoft Windows and Cisco products and that may include computers based on UNIX, Linux, Sun Solaris, or Mac OS X platforms as well as BYOD clients with Apple iOS handhelds or Google Android or Windows Phone handsets.

Progent can also help you outsource spam filtering and protection from email-borne attacks. Email Guard is Progent's email filtering and encryption platform that uses the technology of leading data security vendors to provide web-based control and comprehensive protection for all your inbound and outbound email. The powerful structure of Progent's Email Guard integrates cloud-based filtering with a local gateway device to offer complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The Cloud Protection Layer acts as a preliminary barricade and keeps the vast majority of threats from making it to your network firewall. This decreases your exposure to inbound attacks and conserves system bandwidth and storage space. ProSight Email Guard's onsite gateway device adds a further layer of analysis for inbound email. For outbound email, the onsite security gateway offers AV and anti-spam filtering, DLP, and email encryption. The local gateway can also help Exchange Server to track and safeguard internal email that originates and ends within your security perimeter.

Progent's certified experts are available remotely or on premises to provide a variety of urgent or project-based network security services such as:

  • Run extensive network security evaluations
  • Recover rapidly after attacks
  • Install effective firewalls
  • Configure secure solutions for offsite and mobile access
  • Install advanced utilities for automatic defense against viruses, spam and directory harvest attacks
  • Develop a company-wide security plan with 24x7 security monitoring
  • Offer comprehensive Call Center Services
  • Develop an effective network backup and disaster recovery plan built around Data Protection Manager backup/restore capability
If your company has an emergency need for IT security help, go to Progent's Urgent Online Network Support.

Progent's engineers provide advanced services in key fields of system protection that include security evaluation, firewall and VPN solutions, and advanced security consulting.

System Evaluation
Progent's certified security consultants can evaluate the effectiveness of your existing network security environment by performing comprehensive remote automated testing via sophisticated utilities and proven procedures. Progent's skill in this testing saves your company time and money and offers an objective portrayal of security holes. The knowledge your business gains can make up the foundation of a security strategy that will allow your network to run dependably and respond rapidly to new risks.

Automated Network Security Evaluation
Progent offers consulting in the use of security testing packages such as Microsoft Baseline Security Analyzer and GFI LANguard for economically performing a set of programmed network auditing checks to uncover potential security holes. Progent has broad experience with other security auditing utilities including NMAP, AMAP, eEye, as well as utilities such as Metasploit Framework, Netcat, Hydra, and Nikto. Progent can show you how to make sense of testing reports and respond appropriately.

Progent can show you how to build security into your company operations, configure scanning tools, plan and deploy a secure network architecture, and suggest policies to optimize the security of your IT system. Progent's security consultants are available to help you configure a firewall, design safe remote access to email and data, and integrate virtual private network. Find out more concerning Progent's network security audits.

Security Inventory Service Bundles for Small Businesses
Progent offers two low-cost security inventory service packages intended to allow small businesses to receive a professional network security assessment from a certified security consultant. With Progent's External Security Inventory Scan, an engineer administers a comprehensive test of your network from outside your company firewall to uncover possible weaknesses in the security posture you expose to the outside world. With Progent's Internal Security Inventory Checkup, an engineer runs a network scan from a secure computer within your firewall to uncover vulnerabilities to internal threats. Both security inventory packages are configured and executed from a protected remote location. The project is managed by an engineer with top security credentials and who produces a document that summarizes and interprets the information captured by the security scan and suggests practical remediation where appropriate.

Network Penetration Analysis Support Services
Stealth intrusion checking is an important component of any successful network security strategy. Progentís security professionals can run thorough intrusion checks without the awareness of your company's internal IT resources. Unannounced penetration testing uncovers whether current security defense systems such as intrusion detection alerts and event log monitoring are properly configured and actively checked. Learn more about Progent's network penetration testing consulting.

Firewall And Virtual Private Network (VPN) Expertise
Progent's expertise in security technology encompasses in-depth familiarity with major firewalls and Virtual Private Network technology offered by a variety of companies including Cisco, Microsoft, and CheckPoint. Progent can provide the services of engineers who have earned key industry accreditations including Cisco Certified Internetwork Expert and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Integration and Troubleshooting
The current ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer significantly more performance than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 firewalls for new installations. Following Cisco's acquisition of Sourcefire, the whole line of ASA 5500-X devices can be provisioned to support Firepower Services, built on Sourcefire's Snort technology, which is the world's most deployed intrusion protection system (IPS). Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist your company to manage your existing PIX or Cisco ASA 5500 firewalls or migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your organization to design, configure, tune, administer and debug firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Find out more information about ASA 5500-X Firewalls with Firepower Services configuration and debugging support.

Cisco Network Security and Virtual Private Network Engineering Expertise
Cisco's security and offsite connection technology provide a comprehensive range of manageable security products to help safeguard your wired and wireless information system. Cisco's Virtual Private Network line features routers, firewalls, intrusion detection devices and VPN concentrators. Progent's professional staff of consultants includes experienced specialists with Cisco's Certified Internetwork Expert and CCNP qualifications who are able to help your organization to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that align best with your business goals. Read additional information about Progent's Support Expertise for Cisco Security and Virtual Private Network Products.

Consulting Expertise for Additional Firewall and Virtual Private Network Technology
Progent provides small and mid-size organizations professional consulting for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and VPN security vendors including Check Point Software, Juniper Networks, and SonicWALL. Progent can help you create a detailed security strategy and select the right products from a variety of vendors to support your security goals while staying within your budget limits.

Progent's Fixed-price Managed Services for Information Security
Progent's low-cost ProSight series of outsourced network management services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email filtering and encryption platform that incorporates the technology of leading information security companies to provide centralized control and comprehensive protection for all your inbound and outbound email. The hybrid architecture of Email Guard managed service integrates cloud-based filtering with an on-premises gateway appliance to provide complete protection against spam, viruses, Dos Attacks, DHAs, and other email-borne threats. ProSight Email Guard's cloud filter serves as a preliminary barricade and blocks the vast majority of threats from reaching your security perimeter. This reduces your vulnerability to inbound threats and conserves system bandwidth and storage space. ProSight Email Guard's on-premises gateway device provides a further level of analysis for incoming email. For outgoing email, the onsite security gateway provides anti-virus and anti-spam protection, DLP, and encryption. The onsite security gateway can also help Exchange Server to track and safeguard internal email that originates and ends within your corporate firewall. Find out more about Progent's ProSight Email Guard Spam Filtering, Virus Defense, Content Filtering and Data Leakage Prevention.

ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes next generation behavior-based analysis technology to defend endpoint devices and physical and virtual servers against modern malware attacks such as ransomware and file-less exploits, which routinely get by traditional signature-matching anti-virus products. ProSight Active Security Monitoring protects local and cloud-based resources and offers a single platform to manage the entire threat progression including blocking, infiltration detection, containment, cleanup, and post-attack forensics. Key capabilities include single-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring Endpoint Protection and Ransomware Defense.

ProSight DPS: Managed Backup
ProSight Data Protection Services from Progent offer small and mid-sized businesses a low cost and fully managed service for reliable backup/disaster recovery. For a fixed monthly cost, ProSight Data Protection Services automates and monitors your backup activities and enables rapid restoration of vital files, applications and VMs that have become lost or corrupted due to hardware failures, software bugs, natural disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, apps, system images, as well as Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to a local device, or to both. Progent's BDR consultants can deliver world-class support to configure ProSight DPS to to comply with government and industry regulatory requirements such as HIPPA, FINRA, PCI and Safe Harbor and, whenever needed, can assist you to restore your critical data. Read more about ProSight DPS Managed Backup and Recovery.

Certified Network Security Planning
Every business ought to develop a thoroughly thought out security strategy that incorporates both preventive processes and reaction plans. The pre-attack plan is a set of mechanisms that help to minimize security weaknesses. The post-attack plan assists your network security engineers to assess the damage resulting from a security penetration, repair the network, record the experience, and get the IT network running as quickly as possible.

Progent's expert IT security consultants can to assist your company to run a comprehensive vulnerability assessment and define a computer security plan to implement security processes and controls to minimize future assaults and dangers.

CISM Qualified Security Consulting Expertise
The CISM organization defines the basic capabilities and worldwide standards of performance that information security managers are expected to learn. It provides executive management the assurance that consultants who have earned their CISM credential have the experience and knowledge to provide efficient security management and consulting services. Progent offers the services of CISM qualified security consultants to help companies with:

  • Network Security Processes
  • Risk Management
  • Network Security Implementation Management
  • IS Security Management
  • Response Management
Read more information concerning Progent's CISM Qualified Information Security Engineering Services.

CISSP Certified Security Engineering Assistance
CISSP recognizes mastery of a worldwide standard for information security. ANSI has awarded the CISSP credential accreditation in the area of data protection under ISO 17024. Progent can provide access to of security consultants who have earned CISSP certification. Progent can provide a CISSP-certified consultant to help your company in a broad range of security fields including:

  • Security Management Practices
  • Security Infrastructure and Models
  • Access Management Solutions and Processes
  • Applications Development Security
  • Secure Operations
  • Site Security
  • Encryption/Decryption Mechanisms
  • Telecom, LAN and Internet Security
  • Business Continuity Preparedness
Learn more details concerning Progent's CISSP Information Security Consulting Expertise.

ISSAP Qualified Secure Network Architecture Engineering Assistance
Progent's ISSAP certified information system architecture professionals are experts who have been awarded ISSAP status as a result of rigorous testing and significant work with information security architecture. The Information System Security Architecture Professional (ISSAP) credential represents demonstrated mastery in the more in-depth demands of IS security architecture bounded by the wider scope of IS security knowledge required for CISSP certification. Progent's ISSAP-certified security consultants can assist your company with all aspects of secure network architecture such as.

  • Access Control Mechanisms and Techniques
  • Telecom and Network Security
  • Data Encryption Options
  • Needs Evaluation and Security Guidelines
  • Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
  • Hardware Security
Learn additional details about Progent's ISSAP Certified Secure IT Architecture Support Professionals.

CISA Certified Network Security Auditing Consulting Assistance
The Certified Information Systems Auditor (CISA) accreditation is a prestigious achievement that indicates expertise in information system security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA credential requires that candidates pass an extensive test given by the ISACA international professional group. Progent's CISA-qualified IS security audit engineers can assist your IT organization with:

  • Information Systems Audit Services
  • Information Technology Governance
  • Network Assets and Architecture Planned Useful Life
  • IT Support
  • Protecting Data Assets
  • Business Continuity Preparedness
Learn more information concerning Progent's CISA Certified Network Security Auditing Engineering Expertise.

Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC program was initiated by ISACA in 2010 to verify an IT professional's ability to plan, implement, and support IS control mechanisms to mitigate risk. Progent can provide the services of a CRISC-certified consultant to assist you to create and carry out a workplace continuity or disaster recovery strategy based on leading practices identified by CRISC and geared to match your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC-qualified IT risk mitigation specialists can provide a variety of risk assessment services including:

  • Gather data and review documentation to evaluate significant risk scenarios
  • Inventory statutory, industry, and contractual requirements and organizational standards related to your information system to determine their possible impact on your business objectives
  • Point out potential vulnerabilities for your business processes to assist in analyzing your corporate risk
  • Create a risk awareness initiative and provide seminars to make sure your stakeholders understand IT risk so they can contribute to your risk control program
  • Connect identified risk scenarios to your associated operational processes to help determine risk responsibility
  • Validate risk appetite with executive management and major stakeholders to make sure they align
Find out additional details about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Accredited IS Security Engineering Support
GIAC (Global Information Assurance Certification) was established in 1999 to validate the knowledge of computer security professionals. GIAC's goal is to ensure that a certified professional possesses the skills necessary to provide support in key categories of network, data, and software security. GIAC accreditations are recognized by businesses and government organizations all over the world including and the United States NSA. Progent's GIAC-certified IS security audit specialists can help your business in the areas of:

  • Assessing Perimeters
  • Incident Handling
  • Intrusion Detection
  • Web Services Security
  • SIEM solutions
Read more information concerning Progent's GIAC Information Assurance Expertise.

Talk to a Certified Progent Security Specialist
To learn how you can get in touch with a security consultant for online or onsite support in California, phone 1-800-993-9400 or visit Remote Computer Help.

© 2002- 2018 Progent Corporation. All rights reserved.