Company information networks in the state of Florida can depend on quick and economical online help from Progent's qualified network security consultants to help with critical security problems. Rates are affordable, charges are per minute, engagement is quick, and service is unbeatable. Progent also provides help for long-term projects that demand the expertise of senior security engineers with high-level industry certifications.

In case your Florida office is far from major urban neighborhoods like Jacksonville, Miami, Tampa, St. Petersburg, Hialeah, or Orlando, help from nearby accredited security engineers is often limited when you have a security disaster. This can cause a loss of revenue for your business, upset customers, idle employees, and distracted executives. By calling Progent, you have access to a certified security professional ready to deliver help whenever you need it to keep your computer network running and salvage your information.

Progent can assist you at any level in your initiatives to defend your network with support services ranging from security audits to developing a company-wide security strategy. Progent offers affordable service to assist companies of any size to set up and manage protected IT environments powered by Microsoft Windows and Cisco products and that may include servers and desktops running UNIX or Linux operating systems plus BYOD clients with Apple handhelds or Google Android or Windows Phone devices.

Progent can also show you how to outsource spam filtering and defense against e-mail-based security threats. Email Guard is Progent's email filtering and encryption platform that uses the services and infrastructure of leading data security companies to deliver web-based management and world-class security for all your inbound and outbound email. The powerful structure of Email Guard integrates a Cloud Protection Layer with a local gateway appliance to provide advanced protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne malware. ProSight Email Guard's Cloud Protection Layer acts as a preliminary barricade and blocks the vast majority of unwanted email from reaching your security perimeter. This decreases your vulnerability to inbound attacks and saves system bandwidth and storage. ProSight Email Guard's onsite gateway device adds a deeper level of analysis for inbound email. For outgoing email, the local gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite gateway can also help Microsoft Exchange Server to monitor and protect internal email that originates and ends inside your corporate firewall.

Progent's certified experts are available online or in person to offer a range of urgent or project-based IT security services including:

If your business has an immediate requirement for computer security help, refer to Progent's Emergency Remote Technical Support.

Progent's support professionals provide world-class services in key fields of computer protection including analysis, firewall/VPN support, and advanced security consulting.

Security Assessment
Progent's certified security consultants can evaluate the strength of your current computer security systems through comprehensive remote automated analysis via sophisticated software tools and proven techniques. Progent's experience in this testing saves your company consulting fees and offers an objective picture of weaknesses. The information your company gains can be used as the basis of a network protection strategy that can permit your information system to operate safely and adapt quickly to future risks.

Automated Security Evaluation
Progent provides consulting in the use of security testing software such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard NSS for affordably running a set of programmed network testing checks to identify possible security problems. Progent has broad experience with additional security analysis utilities such as NMAP, AMAP Application Scanner, eEye, plus tools such as Metasploit Framework, Netcat, Socat, and Nikto. Progent can help you to understand testing reports and react appropriately.

Progent can show you how to build security into your business operations, configure scanning tools, define and implement a secure network architecture, and suggest procedures to optimize the security of your network. Progent's security professionals are available to assist you to configure a firewall, implement secure remote access to email and business applications, and install virtual private network. Find out more concerning Progent's automated security analysis.

Security Inventory Scanning Bundles for Small Businesses
Progent offers two ultra-affordable security inventory service packages designed to enable small businesses to get an objective security assessment from an accredited security expert. With Progent's External Network Security Inventory Checkup, an engineer administers an extensive examination of your IT infrastructure from outside your company firewall to uncover potential risks in the security profile you present to the public. With Progent's Internal Network Security Inventory Scan, a security engineer executes a network scan from a secure machine inside your firewall to determine your exposure to internal attacks. The two security inventory packages are configured and executed from a protected external site. The process is overseen by an engineer with high-level security credentials and who generates a report that details and analyzes the information collected by the security scan and suggests practical improvements where called for.

Network Security Penetration Analysis Support Services
Stealth penetration checking is an important part of any successful network security plan. Progentís security experts can perform thorough penetration checks without the knowledge of your organization's in-house network support staff. Stealth penetration checking uncovers whether current security defense systems such as intrusion incident alerts and event history analysis are properly configured and consistently checked. Find out more on Progent's network security penetration analysis consulting.

Firewall And Virtual Private Network (VPN) Expertise
Progent's expertise in network security technology encompasses extensive familiarity with major firewalls and Virtual Private Network technology offered by a variety of vendors including Cisco, Microsoft, and CheckPoint. Progent can provide the support of engineers who have earned important networking certifications including Cisco Certified Internetwork Expert and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Integration and Debugging
The current Cisco ASA 5500-X Family of firewalls with Firepower Services deliver substantially more value than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX firewalls for all new installations. After Cisco's acquisition of Sourcefire, the whole line of ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed network intrusion protection system (IPS). Firepower services provide powerful new features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network consultants can help you to maintain your existing PIX or ASA 5500 firewalls or migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your business to plan, integrate, tune, administer and troubleshoot firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Learn more details about Cisco ASA 5500-X Firewalls with Firepower integration and troubleshooting support.

Cisco Security and Virtual Private Network Engineering Expertise
Cisco's network security and remote access products provide a full range of easy-to-administer security products to help safeguard your local and remote information system. Cisco's VPN line features routers, firewalls, intrusion detection devices and VPN appliances. Progent's expert staff of consultants includes field-proven specialists with Cisco's CCIE and Cisco Certified Network Professional qualifications who can assist your business to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that fit most closely with your company objectives. Find out additional details about Progent's Support Expertise for Cisco Security Technology and Virtual Private Network Appliances.

Consulting Expertise for Other Firewall and Virtual Private Network Solutions
Progent provides small and medium size organizations expert consulting for Intrusion Protection Systems and IPsec VPN technology from major firewall and VPN security companies such as WatchGuard, Juniper Networks, and Symantec. Progent can show you how to create a comprehensive security plan and select the right technologies from multiple vendors to support your security objectives while sticking within your spending restraints.

Progent's Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight family of outsourced network management services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. ProSight managed services available from Progent include:
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email security platform that uses the services and infrastructure of top data security companies to provide web-based management and comprehensive security for all your inbound and outbound email. The powerful structure of Progent's Email Guard managed service combines cloud-based filtering with a local security gateway device to offer advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based threats. ProSight Email Guard's Cloud Protection Layer serves as a first line of defense and blocks the vast majority of threats from reaching your network firewall. This decreases your exposure to external attacks and saves system bandwidth and storage. ProSight Email Guard's on-premises security gateway appliance adds a further level of inspection for inbound email. For outbound email, the on-premises gateway provides AV and anti-spam filtering, protection against data leaks, and encryption. The onsite security gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email that stays inside your security perimeter. Find out more about Progent's ProSight Email Guard Spam Filtering, Virus Defense, Email Content Filtering and Data Leakage Protection.

ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection service that incorporates next generation behavior-based analysis technology to defend endpoints as well as physical and virtual servers against new malware attacks like ransomware and email phishing, which easily evade traditional signature-based anti-virus products. ProSight ASM protects on-premises and cloud-based resources and provides a single platform to address the entire threat progression including protection, identification, mitigation, cleanup, and forensics. Key capabilities include single-click rollback with Windows Volume Shadow Copy Service and real-time network-wide immunization against newly discovered attacks. Read more about Progent's ProSight Active Security Monitoring Next-Generation Endpoint Protection and Ransomware Defense.

ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services offer small and medium-sized businesses a low cost and fully managed service for reliable backup/disaster recovery (BDR). Available at a low monthly price, ProSight Data Protection Services automates and monitors your backup processes and enables fast restoration of vital files, apps and VMs that have become unavailable or damaged due to hardware failures, software bugs, natural disasters, human error, or malicious attacks like ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, applications, system images, plus Hyper-V and VMware images. Important data can be backed up on the cloud, to an on-promises storage device, or mirrored to both. Progent's BDR consultants can provide world-class support to configure ProSight DPS to be compliant with regulatory requirements like HIPPA, FINRA, and PCI and, whenever necessary, can assist you to recover your business-critical information. Learn more about ProSight DPS Managed Cloud Backup and Recovery.

Certified Network Security Planning
Every business ought to develop a carefully thought out security strategy that includes both pre-attack processes and response planning. The pre-attack strategy is a set of procedures designed to reduce vulnerabilities. The post-attack plan helps your IT security engineers to evaluate the impact resulting from an attack, repair the network, document the experience, and get the IT network restored as rapidly as possible.

Progent's expert information security engineers are available to assist you to run a complete vulnerability assessment and create a company-wide security strategy to implement security policies and controls to reduce ongoing attacks and dangers.

CISM Certified Network Security Support Services
The Certified Information Security Manager (CISM) committee describes the basic capabilities and global standards of performance that IT security managers are required to master. It gives executive management the confidence that consultants who have qualified for their CISM credential possess the experience and knowledge to deliver efficient security administration and consulting consulting. Progent can provide the services of CISM certified security professionals to help businesses with:

  • Network Security Governance
  • Risk Management
  • IS Security Implementation Management
  • Information Security Administration
  • Recovery Planning
Learn additional details concerning Progent's CISM Accredited Network Security Support Services.

CISSP Certified Security Engineering Services
The CISSP credential recognizes expertise with a global standard for data security. The American National Standards Institute has granted the CISSP credential recognition in the field of information security under ISO/IEC 17024. Progent can provide access to of security professionals who have qualified for CISSP certification. Progent can provide a CISSP-certified expert to help your enterprise in a broad range of security areas such as:

  • Security Management Procedures
  • Security Infrastructure and Models
  • Access Management Solutions and Processes
  • Software Development Security
  • Operations Security
  • Physical Security
  • Encryption/Decryption Mechanisms
  • Telecommunications, LAN and WAN Security
  • Disaster Recovery Preparedness
Find out additional details about Progent's CISSP Accredited Security Engineering Services.

ISSAP Accredited Secure Information System Architecture Consulting Support
Progent's ISSAP qualified network architecture engineers are experts who have earned ISSAP Certification as a result of rigorous testing and extensive experience with information security design. The Information System Security Architecture Professional (ISSAP) certification represents proven competence in the most in-depth requirements of IS security architecture within the wider field of information security knowledge required for CISSP accreditation. Progent's ISSAP-certified security specialists can assist your company with all phases of architecture security including.

  • Access Management Mechanisms and Methodologies
  • Telecom and Network Protection
  • Cryptography Solutions
  • Requirements Evaluation and Security Guidelines
  • Business Continuity Planning and Disaster Recovery Planning
  • Hardware Security
Read additional details concerning Progent's ISSAP Qualified Secure Information System Architecture Support Expertise.

CISA Certified Information System Security Auditing Consulting Expertise
The Certified Information Systems Auditor accreditation is a globally recognized qualification that indicates mastery in network security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA credential has consultants undergo an extensive examination given by the ISACA international professional association. Progent's CISA IS security audit consultants are available to assist your business with:

  • IS Audit Services
  • IT Governance
  • Network Assets and Architecture Lifecycle
  • IT Support
  • Protecting Information Resources
  • Disaster Recovery Planning
Learn the details about Progent's CISA Certified Information System Security Auditing Engineering Assistance.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA in 2010 to validate a consultant's ability to plan, deploy, and support IS controls to reduce network risk. Progent offers the expertise of a CRISC-certified engineer to help you to create and carry out a business continuity or disaster recovery plan that follows leading practices identified by CRISC and geared to align with your organization's risk appetite, business goals, and budgetary guidelines. Progent's CRISC-qualified IT risk management engineers offer a range of risk identification services such as:

  • Collect data and study documentation to evaluate major risk scenarios
  • Inventory legal, regulatory, and contractual requirements and organizational policies associated with your network to assess their potential impact on your business goals
  • Identify potential threats for your business processes to assist in analyzing your enterprise risk
  • Create a risk awareness initiative and provide training to make sure your stakeholders appreciate IS risk so they can assist with your risk control program
  • Match key risk vectors to related business processes to help determine risk responsibility
  • Validate risk tolerance with executive management and major stakeholders to make sure they match
Find out additional details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Certified Security Consulting Services
Global Information Assurance Certification was established in 1999 to validate the skill of network security experts. GIAC's goal is to verify that an accredited security consultant has the knowledge appropriate to deliver services in important categories of system, information, and program security. GIAC certifications are recognized by companies and government organizations throughout the world including and the United States NSA. Progent's GIAC-qualified IS security audit specialists can assist your business with:

  • Auditing Security Systems
  • Security Incident Response
  • Intrusion Detection
  • Web-based Services Security
  • SIEM solutions
Find out additional details concerning Progent's GIAC Information Assurance Support.

Talk to a Progent Security Expert
To find out how you can contact a security consultant for online or on-premises support in Florida, call 1-800-993-9400 or visit Online Network Help.

© 2002- 2018 Progent Corporation. All rights reserved.