Small business information networks in the state of California can have prompt and affordable online help from Progent's certified security professionals to resolve critical security issues. The cost is affordable, charges are per minute, engagement is quick, and support is unbeatable. Progent also provides help for complex engagements that demand the expertise of seasoned security consultants with top industry certifications.

If your California office is located far from major urban neighborhoods including Los Angeles, San Diego, San Jose, San Francisco, Long Beach, Fresno, or Sacramento, help from nearby accredited security support specialists is often limited during an urgent situation. This can cause a drop in productivity for your company, upset customers, idle employees, and defocused management. By contacting Progent's online services, you can get in touch with a certified security engineer ready to offer help whenever you have to have it to get your system on line and salvage your data.

Progent can help you at any level in your initiatives to defend your IT environment with support that can range from network security assessments to developing a comprehensive security strategy. Progent offers affordable service to assist companies of any size to set up and manage protected networks based on Microsoft Windows and Cisco technology and that can include servers and desktops running UNIX, Linux, Solaris, or Apple Mac OS X platforms as well as BYOD users with Apple iOS handhelds or Google Android or Windows Phone smart phones and tablets.

Progent can also show you how to outsource spam blocking and defense against email-borne security threats. Email Guard is Progent's email filtering and encryption platform that uses the technology of top data security companies to provide web-based management and world-class protection for your inbound and outbound email. The powerful structure of Email Guard managed service combines a Cloud Protection Layer with an on-premises gateway device to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. Email Guard's cloud filter acts as a first line of defense and blocks the vast majority of threats from making it to your security perimeter. This reduces your exposure to external threats and conserves system bandwidth and storage space. Email Guard's onsite gateway appliance provides a further layer of analysis for incoming email. For outgoing email, the local gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The onsite gateway can also assist Microsoft Exchange Server to track and safeguard internal email traffic that stays within your security perimeter.

Progent's security consultants are available online or on premises to provide a variety of urgent or project-based IT security services which include:

If your network has an emergency need for computer security support, refer to Progent's Urgent Remote Technical Support.

Progent's support professionals provide world-class support in vital fields of computer protection that include analysis, firewalls and VPN, and advanced security planning.

System Evaluation
Progent's expert security engineers can evaluate the strength of your current network security environment by performing exhaustive remote automated testing via advanced utilities and proven procedures. Progent's skill in administering this testing saves your company time and money and offers an accurate portrayal of security holes. The knowledge your business gains can make up the foundation of a security strategy that will allow your network to run safely and respond quickly to future threats.

Automated Network Vulnerability Analysis
Progent offers consulting in the use of security auditing products such as Microsoft's MBSA and GFI LANguard NSS for affordably performing a set of automatic network testing checks to uncover potential security problems. Progent has extensive knowledge of other security auditing tools including NMAP Port Scanner, AMAP application mapper, eEye, as well as utilities such as Metasploit Framework, Netcat, Hydra, and Nikto. Progent can show you how to make sense of testing reports and react effectively.

Progent can show you how to design security into your company processes, install auditing software, plan and deploy a protected system environment, and recommend policies to optimize the security of your IT system. Progent's security engineers are able to show you how to configure a firewall, design secure remote connectivity to email and data, and integrate virtual private network. Find out additional information concerning Progent's network security analysis.

Security Inventory Bundles for Small Companies
Progent has put together two low-cost security inventory scanning bundles designed to enable small companies to get a professional security assessment from a qualified security expert. With Progent's External Security Inventory Checkup, a security expert runs an extensive examination of your network from outside your company firewall to determine potential weaknesses in the security posture you expose to the public. With Progent's Internal Network Security Inventory Scan, a security expert executes a network scan from a secure computer inside your firewall to assess the risk to internal threats. Both security inventory packages are configured and executed from a protected remote location. The process is directed by a consultant with top security credentials and who generates a report that summarizes and analyzes the information captured by the scan and proposes cost-effective remediation if called for.

Network Intrusion Analysis Consulting
Stealth intrusion checking is a key part of any successful IT system security strategy. Progentís security professionals can run thorough penetration tests without the awareness of your organization's in-house network support resources. Stealth penetration testing uncovers whether existing security defense tools such as intrusion detection warnings and event history monitoring are correctly configured and consistently checked. Learn more about Progent's network security penetration testing consulting.

Firewall and Virtual Private Network Support
Progent's expertise in security technology encompasses extensive familiarity with leading firewalls and Virtual Private Network (VPN) products from a variety of companies including Cisco Systems, Microsoft, and Symantec. Progent offers the services of consultants who have earned key networking accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Troubleshooting
The current ASA 5500-X Family of firewalls with Firepower Services offer significantly more value than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new installations. Following Cisco's purchase of Sourcefire, the whole family of ASA 5500-X firewalls can be configured to support Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system (IPS). Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist you to maintain your current PIX or Cisco ASA 5500 security appliances and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite support for ASA 5500-X firewalls with Firepower Services and can help your organization to design, deploy, optimize, administer and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about Cisco ASA 5500-X Firewalls with Firepower configuration and debugging support.

Cisco Network Security and Virtual Private Network Consulting Services
Cisco's security and remote access technology provide a comprehensive range of manageable security products to help protect your local and remote information system. Cisco's Virtual Private Network line includes switches, firewalls, intrusion detection systems and VPN appliances. Progent's expert consulting staff includes experienced specialists with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional qualifications who can help your business to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that fit best with your business goals. Read more details about Progent's Support Services for Cisco Security Technology and Virtual Private Network Products.

Support Services for Other Firewall and Virtual Private Network Solutions
Progent offers small and medium size businesses expert support for Intrusion Protection products and IPSec VPN products from major firewall and VPN security companies such as WatchGuard, Juniper, and SonicWALL. Progent can help you design a detailed security strategy and select appropriate products from a variety of suppliers to support your security goals while staying within your spending limits.

Expert Network Security Planning
Every company ought to have a carefully thought out security program that incorporates both preventive procedures and response plans. The pre-attack strategy is a collection of mechanisms designed to reduce vulnerabilities. The reactive plan assists your IT security personnel to evaluate the damage caused by an attack, fix the system, document the event, and get business functions running as rapidly as possible.

Progent's expert IS security consultants can to help you to perform a complete vulnerability assessment and create a computer security strategy to implement security policies and controls to minimize ongoing attacks and threats.

CISM Certified System Security Engineering Assistance
The CISM committee defines the basic capabilities and worldwide standards of performance that IT security managers are required to learn. It gives executive management the confidence that those who have qualified for their CISM credential possess the background and knowledge to deliver efficient security administration and support services. Progent can provide the services of CISM qualified security professionals to assist companies with:

  • IS Security Strategies
  • Vulnerability Management
  • Network Security Implementation Management
  • IS Security Management
  • Recovery Planning
Read more information concerning Progent's CISM Qualified Security Engineering Professionals.

CISSP Qualified Security Consulting Support
CISSP recognizes expertise with an international standard for network security. The American National Standards Institute has granted certification recognition in the field of information protection under ISO/IEC 17024. Progent offers access to of security experts who have earned CISSP certification. Progent can provide a CISSP-certified professional to help your enterprise in a variety security areas such as:

  • Security Administration Practices
  • Security Architecture and Paradigms
  • Access Management Solutions and Processes
  • Software Development Security
  • Operations Security
  • Site Security
  • Encryption/Decryption Technology
  • Telecom, Network and Internet Security
  • Disaster Recovery Preparedness
Learn additional information concerning Progent's CISSP Qualified Network Security Engineering Professionals.

ISSAP Qualified Secure IT Architecture Consulting Expertise
Progent's ISSAP certified network architecture engineers are experts who have been awarded ISSAP Certification through rigorous examination and significant work with network security architecture. The ISSAP certification indicates demonstrated competence in the most challenging demands of information system security architecture bounded by the broader scope of information security knowledge needed for CISSP accreditation. Progent's ISSAP-qualified security specialists can assist your business with all phases of secure network architecture including.

  • Access Control Mechanisms and Techniques
  • Telecommunications and System Infrastructure Protection
  • Encryption/Decryption Options
  • Needs Analysis and Security Guidelines
  • Business Continuity Planning (BCP) and Disaster Recovery Planning
  • Hardware Security
Find out additional information concerning Progent's ISSAP Certified Secure System Architecture Support Professionals.

CISA Qualified Security Auditing Consulting Support
The CISA credential is a recognized achievement that signifies expertise in information system security auditing. Certified by the American National Standards Institute, the CISA credential requires that candidates undergo a comprehensive test given by the ISACA international professional association. Progent's CISA-qualified security audit experts can assist your company with:

  • IS Audit Process
  • IT Administration
  • Network Assets and Architecture Planned Useful Life
  • Information Technology Support
  • Safeguarding Data Assets
  • Disaster Recovery Planning
Read additional information concerning Progent's CISA Qualified IS Security Auditing Engineering Expertise.

CRISC Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA to verify a consultant's ability to design, deploy, and maintain IS control mechanisms to mitigate risk. Progent offers the services of a CRISC-certified engineer to assist you to develop and execute a business continuity or disaster recovery strategy based on industry best practices promoted by CRISC and geared to match your company's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC-qualified IT risk mitigation experts can provide a variety of risk identification services including:

  • Collect information and review documentation to identify significant vulnerabilities
  • Inventory legal, industry, and contractual mandates and organizational policies associated with your information system to determine their possible impact on your strategic goals
  • Point out possible vulnerabilities for your operational processes to help in analyzing your enterprise risk
  • Develop a risk awareness initiative and provide seminars to ensure your stakeholders understand IT risk so they can contribute to your risk control process
  • Connect identified risk scenarios to related operational procedures to help determine risk responsibility
  • Validate risk appetite with your senior leadership and major stakeholders to ensure they are in agreement
Read more details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Qualified Network Security Consulting Support
GIAC (Global Information Assurance Certification) was established in 1999 to certify the knowledge of network security experts. GIAC's goal is to make sure that a certified professional has the skills needed to deliver services in important categories of system, data, and program security. GIAC certifications are acknowledged by businesses and government organizations throughout the world including and the United States National Security Agency. Progent's GIAC-qualified IS security audit specialists are available to help your business in the areas of:

  • Assessing Perimeters
  • Incident Response
  • Intrusion Detection
  • Web-based Application Security
Find out additional information concerning Progent's GIAC IS Security Engineering Assistance.

Talk to a Certified Security Expert
To find out how to access a certified Progent security consultant for remote or on-premises support in California, call 1-800-993-9400 or visit Remote Computer Support.














© 2002- 2017 Progent Corporation. All rights reserved.