Cisco VPN Support ServicesCisco's security solutions for small to medium size companies offer a complete set of easy-to-manage network protection hardware and software to enable you to protect your wired and wireless network infrastructure. Cisco's rich catalog of security and Virtual Private Network solutions includes routers, switches, PIX and ASA firewalls, intrusion detection systems (IDS), and VPN concentrators. Progent's expert consulting staff includes experienced professionals with Cisco's CCIE certification who can help your organization to choose and deploy VPN and security solutions that align optimally with your business.

Cisco VPNs
Cisco offers several options for implementing a VPN system, allowing you to choose the approach that best fits your business requirements. You can install both remote connectivity and site-to-site VPNs with IOS Software, through utilities and Advanced Integrated Module (AIM) encryption cards, or with physical devices, such as a VPN access concentrator, router, Cisco ASA 5500-X firewalls with Firepower, or devoted VPN server for dial-up functions. All Cisco VPN approaches are simple to integrate and manage and provide the flexibility to evolve with changing business requirements.

Components Included in Cisco's Protection Technology
Cisco offers a full line of security offerings designed for preventing stealing information, virus outbreaks, Denial of Service (DDoS) assaults, and other threats to your network. Classifications and products include:

Secure Access

  • Virtual Private Network device (Cisco Virtual Private Network concentrators and clients): Dedicated hardware or software mechanism for setting up and managing Virtual Private Networks
  • Catalyst and Nexus Family Switch based: Identity-focused functions integrated into switches
  • Router controlled: VPN capability incorporated into routers
  • Extended perimeter protection
  • PIX or ASA Firewall: Devoted hardware or software mechanism to allow or deny access to the infrastructure or processes
  • Cisco Router based: Firewall capability built into Cisco routers
Penetration Protection
  • Network-based device (Cisco Security Agent): Devoted physical unit or software for detecting intrusions internal to the organization's network
  • Host-based software (Cisco Security Agent): Dedicated hardware or software for detecting, remediating, and reporting intrusions on hosts
  • Cisco Firewall sensor: Detector within a Cisco firewall to sense and report intrusions at the network public/private edge
  • Catalyst Switch sensor: Sensing capability built into a Catalyst switch to find and document intrusions at the switch
  • Cisco Router sensor: Sensing capability within a switch to find and report intrusions at the router
Identity Services
  • Access Control Server using RADIUS and TACACS authentication: Centralized user access control framework for user validation, permission, and accounting from an graphical Web interface
Secure Device Management and Policy
  • Cisco Security Manager: Expandable mechanism for device configuration and security policies for firewalls, Virtual Private Networks, and IPS

How Progent's Consultants Can Assist Your Business with Cisco Security Products
Cisco Certified CCIE Security ExpertsProgent can give you access to a Cisco Certified Internetwork Expert or certified CCNP to assist you to select, deploy, and maintain Cisco security technology. Progent's CISM and CISSP security specialists can show you how to design protection into your company's operations. Progent can help you to produce a documented security strategy to establish precise security policies, install monitoring and auditing software, create and implement a protected connectivity infrastructure that incorporates technology from a variety of vendors, provide Microsoft Internet Security and Acceleration 2006 Server support services and Forefront TMG 2010 configuration help, and advise you about procedures to maximize the protection of your network. Progent's security consulting can help you implement a firewall, design secure remote and mobile access to email and business information, and implement or repair VPNs.

Integration of Cisco and Third-party Security Technology
Progent offers expertise in firewall and VPN products from all major vendors and can help you integrate Cisco technology with additional security solutions to help you build a cost-effective network infrastructure that provides a level of security and flexibility appropriate for your business. Third-party firewall and VPN support services available from Progent include:

For additional information concerning Progent's professional assistance for Cisco technology, pick a topic:

To ask Progent about technical expertise for Cisco technology, call 1-800-993-9400 or visit Contact Progent.

© 2002- 2017 Progent Corporation. All rights reserved.

More topics of interest: