Small business IT networks in the state of Florida can depend on quick and affordable remote help from Progent's certified security engineers to fix critical security problems. The cost is reasonable, charges are per minute, engagement is quick, and support is unbeatable. Progent also offers assistance for complex engagements that demand the knowledge of senior security engineers with top industry credentials.

In case your Florida office is far from more populated metropolitan neighborhoods such as Jacksonville, Miami, Tampa, St. Petersburg, Hialeah, or Orlando, the availability of local accredited network security consultants is often limited during an urgent situation. This can cause a drop in productivity for your company, upset customers, idle employees, and defocused management. By utilizing Progent's online services, you have access to a certified security consultant who can provide assistance when you require it to get your network on line and restore your information.

Progent can assist you at any level in your initiatives to defend your IT environment with support that can range from network security audits to developing a company-wide security plan. Progent offers economical service to assist businesses of all sizes to design and manage safe networks powered by Windows and Cisco products and that may include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X platforms plus mobile clients with Apple iPhones and iPads or Google Android or Windows Phone devices.

Progent can also help you outsource spam blocking and protection from e-mail-based attacks. Email Guard is Progent's email security solution that incorporates the services and infrastructure of leading data security vendors to deliver centralized management and comprehensive protection for all your inbound and outbound email. The hybrid structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with an on-premises gateway appliance to offer complete protection against spam, viruses, Dos Attacks, DHAs, and other email-borne threats. ProSight Email Guard's cloud filter acts as a first line of defense and blocks most threats from making it to your security perimeter. This reduces your exposure to external attacks and saves system bandwidth and storage. ProSight Email Guard's onsite gateway appliance provides a further layer of inspection for incoming email. For outgoing email, the on-premises gateway provides AV and anti-spam filtering, protection against data leaks, and email encryption. The onsite security gateway can also enable Microsoft Exchange Server to track and safeguard internal email that originates and ends inside your corporate firewall.

Progent's security consultants are accessible remotely or on site to provide a range of emergency or longer-term IT security services such as:

If your company has an urgent need for IT security support, refer to Progent's Urgent Remote Network Help.

Progent's engineers can deliver advanced support in key areas of computer protection including analysis, firewalls and VPN, and high-level security consulting.

System Evaluation
Progent's expert security engineers can evaluate the strength of your current network protection environment by performing comprehensive remote automated testing via advanced utilities and tested procedures. Progent's experience in administering this service saves you consulting fees and offers a detailed portrayal of system vulnerability. The knowledge your company is provided can make up the foundation of a network protection strategy that will permit your information system to operate safely and react quickly to new risks.

Automated Security Audits
Progent offers expertise in the application of security analysis packages such as Microsoft Baseline Security Analyzer and GFI LANguard for affordably performing a set of automatic system testing checks to uncover potential security weaknesses. Progent has extensive experience with additional network analysis products including NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, as well as utilities like Metasploit, Hydra, and Nikto. Progent can help you to make sense of audit reports and respond effectively.

Progent can show you how to design security into your business operations, install scanning tools, define and implement a secure network environment, and suggest procedures to maximize the safety of your IT system. Progent's security professionals are ready to assist you to configure a firewall, design secure remote access to email and data, and install VPN. Learn more concerning Progent's automated security audits.

Security Inventory and Evaluation Packages for Small Businesses
Progent offers two ultra-affordable security inventory bundles intended to allow small companies to receive an objective network security evaluation from an accredited security consultant. With Progent's External Network Security Inventory Scan, a security engineer administers a comprehensive examination of your IT infrastructure from outside your firewalled perimeter to uncover potential weaknesses in the security posture you expose to the public. With Progent's Internal Security Inventory Checkup, a security expert executes a system scan from an authorized machine within your company firewall to determine your exposure to internal attacks. Both security inventory services are set up and run from a protected remote site. The project is managed by an engineer who has earned top security credentials and who generates a document that details and analyzes the data collected by the scan and proposes cost-effective remediation if appropriate.

Stealth Intrusion Analysis Support Services
Stealth intrusion checking is an important component of any successful IT system security plan. Progent’s security professionals can perform extensive intrusion tests without the awareness of your company's internal network support staff. Unannounced penetration checking uncovers whether existing security monitoring systems such as intrusion incident alerts and event history monitoring are correctly set up and consistently checked. Find out additional information on Progent's stealth penetration analysis consulting.

Firewall and Virtual Private Network Expertise
Progent's expertise in security technology encompasses in-depth field work with leading firewalls and Virtual Private Network (VPN) technology offered by multiple vendors such as Cisco, Microsoft, and Juniper. Progent can provide the services of consultants with key networking accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Troubleshooting
The new ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer significantly more performance than Cisco's previous firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new installations. After Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X firewalls can be configured to enable Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed network intrusion protection system (IPS). Firepower services bring powerful new capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can assist your company to maintain your existing PIX or ASA 5500 security appliances or upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can help you to design, configure, tune, manage and troubleshoot firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Learn more details about ASA Firewalls with Firepower Services configuration and debugging services.

Cisco Network Security and VPN Support Services
Cisco's network security and remote connection technology provide a comprehensive range of manageable security products to help protect your local and remote network infrastructure. Cisco's VPN line includes routers, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's professional consulting staff includes experienced engineers with Cisco CCIE and Cisco Certified Network Professional certifications who can assist your business to select Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that align most closely with your company goals. Read additional details concerning Progent's Support Services for Cisco Security Solutions and Virtual Private Network Products.

Consulting Expertise for Other Firewall and Virtual Private Network Technology
Progent offers small and medium size organizations professional consulting for Intrusion Protection products and IPsec VPN technology from major firewall and VPN security companies including Check Point Software, Juniper Networks, and SonicWALL. Progent can show you how to create a detailed security plan and select appropriate products from a variety of suppliers to support your security objectives while staying within your spending restraints.

Progent's Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight line of managed services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes next generation behavior machine learning technology to guard endpoint devices and physical and virtual servers against modern malware attacks like ransomware and file-less exploits, which routinely get by traditional signature-matching AV tools. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and offers a single platform to automate the complete malware attack progression including blocking, detection, containment, cleanup, and forensics. Top capabilities include single-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against newly discovered attacks. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.

ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection services deliver ultra-affordable in-depth security for physical servers and VMs, workstations, smartphones, and Exchange email. ProSight ESP utilizes contextual security and modern behavior analysis for round-the-clock monitoring and reacting to cyber assaults from all attack vectors. ProSight ESP delivers firewall protection, penetration alerts, device control, and web filtering through leading-edge technologies incorporated within a single agent accessible from a single console. Progent's security and virtualization consultants can assist you to plan and implement a ProSight ESP environment that addresses your organization's unique needs and that helps you demonstrate compliance with legal and industry information protection regulations. Progent will help you specify and configure security policies that ProSight ESP will manage, and Progent will monitor your network and react to alerts that require urgent attention. Progent can also help you to install and test a backup and restore solution like ProSight Data Protection Services (DPS) so you can get back in business quickly from a potentially disastrous cyber attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Exchange email filtering.

ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services from Progent provide small and medium-sized organizations an affordable and fully managed service for secure backup/disaster recovery. For a fixed monthly cost, ProSight DPS automates your backup activities and enables fast restoration of critical data, applications and virtual machines that have become lost or corrupted due to component breakdowns, software bugs, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware images. Critical data can be backed up on the cloud, to a local device, or mirrored to both. Progent's BDR specialists can deliver world-class support to set up ProSight DPS to to comply with regulatory requirements like HIPPA, FIRPA, and PCI and, whenever needed, can help you to recover your critical information. Read more about ProSight Data Protection Services Managed Backup and Recovery.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the technology of top information security vendors to provide web-based control and comprehensive security for your email traffic. The powerful structure of Email Guard integrates cloud-based filtering with an on-premises gateway appliance to provide complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based malware. The Cloud Protection Layer serves as a preliminary barricade and keeps the vast majority of unwanted email from reaching your security perimeter. This decreases your exposure to external threats and conserves network bandwidth and storage space. Email Guard's on-premises security gateway appliance adds a deeper level of analysis for incoming email. For outgoing email, the on-premises security gateway offers AV and anti-spam filtering, DLP, and email encryption. The local gateway can also help Exchange Server to monitor and safeguard internal email traffic that stays within your corporate firewall. For more information, see Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its key servers and apps hosted in a protected fault tolerant data center on a fast virtual host configured and maintained by Progent's IT support professionals. Under the ProSight Virtual Hosting model, the customer owns the data, the OS software, and the apps. Because the environment is virtualized, it can be moved easily to a different hardware solution without requiring a time-consuming and technically risky configuration process. With ProSight Virtual Hosting, your business is not tied a single hosting service. Learn more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, maintain, retrieve and protect information about your network infrastructure, processes, business apps, and services. You can instantly locate passwords or serial numbers and be alerted automatically about impending expirations of SSL certificates ,domains or warranties. By updating and managing your network documentation, you can eliminate as much as half of time spent searching for critical information about your network. ProSight IT Asset Management features a common repository for storing and sharing all documents required for managing your network infrastructure such as recommended procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and relating IT information. Whether you’re planning enhancements, doing maintenance, or responding to a crisis, ProSight IT Asset Management delivers the knowledge you need the instant you need it. Learn more about ProSight IT Asset Management service.

Expert Security Design
Any company should develop a carefully thought out security program that incorporates both proactive procedures and response planning. The pre-attack strategy is a set of steps intended to reduce security weaknesses. The post-attack strategy helps your company's network security personnel to assess the impact caused by an attack, repair the network, document the experience, and get the IT network running as rapidly as possible.

Progent's expert IS security engineers are available to assist your business to run a complete risk assessment and create a company-wide security plan to implement security processes and controls to reduce future assaults and threats.

CISM Accredited System Security Consulting Services
The Certified Information Security Manager (CISM) organization defines the basic competencies and international standards of performance that IT security managers are required to learn. CISM gives business management the confidence that consultants who have qualified for their CISM credential have the experience and knowledge to provide effective security administration and support consulting. Progent offers the expertise of CISM qualified security professionals to help businesses with:

  • Network Security Processes
  • Vulnerability Analysis
  • IS Security Program Management
  • IS Security Management
  • Response Management
Read additional details about Progent's CISM Network Security Support Professionals.

CISSP Certified Security Engineering Expertise
The CISSP credential denotes expertise with an international standard for network security. ANSI (American National Standards Institute) has granted certification accreditation in the field of information security stipulated by ISO/IEC 17024. Progent offers the services of security experts who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified expert to help your organization in a broad range of security areas including:

  • Security Administration Procedures
  • Security Infrastructure and Paradigms
  • Access Management Systems and Processes
  • Applications Development Security
  • Operations Security
  • Site Security
  • Cryptography Mechanisms
  • Telecommunications, LAN and WAN Security
  • Disaster Recovery Preparedness
Learn additional details concerning Progent's CISSP-certified Security Support Expertise.

CISSP-ISSAP Certified Secure System Architecture Engineering Support
Progent's CISSP-ISSAP qualified information system architecture professionals are consultants who have earned ISSAP status through rigorous examination and significant work with network security design. The Information System Security Architecture Professional (ISSAP) certification indicates demonstrated mastery in the most challenging demands of IS security architecture bounded by the wider field of information system security expertise required for CISSP certification. Progent's ISSAP-certified security consultants can help your company with all aspects of secure network architecture including.

  • Access Management Mechanisms and Methodologies
  • Telecom and Network Security
  • Cryptography Options
  • Requirements Analysis and Security Standards
  • BCP and DRP
  • Hardware Security
Read additional information concerning Progent's ISSAP Qualified Secure Network Architecture Consulting Professionals.

CISA Qualified Network Security Auditing Engineering Services
The CISA credential is a recognized qualification that represents expertise in network security auditing. Certified by the American National Standards Institute, the CISA accreditation has consultants undergo a comprehensive examination given by the ISACA international professional association. Progent's CISA-qualified information security audit consultants are available to assist your business in the areas of:

  • Information Systems Audit Process
  • IT Governance
  • Network Assets and Architecture Planned Useful Life
  • IT Support
  • Protecting Information Assets
  • Disaster Recovery Preparedness
Learn the details about Progent's CISA Certified Security Auditing Engineering Assistance.

CRISC Consultants
The CRISC program was initiated by ISACA to validate an IT professional's ability to design, implement, and maintain IS control mechanisms to mitigate risk. Progent can provide the services of a CRISC-certified consultant to help your company to develop and carry out a workplace continuity or disaster recovery strategy that follows industry best practices identified by CRISC and crafted to align with your company's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC-certified network risk mitigation experts can provide a range of risk identification services such as:

  • Gather information and review documentation to help identify significant risk scenarios
  • Identify statutory, industry, and contractual mandates and organizational policies related to your information system to assess their possible influence on your strategic goals
  • Point out possible vulnerabilities for your operational workflows to help in analyzing your enterprise risk
  • Create a risk awareness initiative and conduct training to ensure your organization understand IT risk so they can assist with your risk control process
  • Match identified risk vectors to related business procedures to help determine risk ownership
  • Validate risk appetite with executive leadership and key stakeholders to ensure they are in agreement
Learn additional details about Progent's CRISC Risk Management Consultants.

GIAC Certified Network Security Engineering Services
GIAC was founded in 1999 to validate the skill of IT security engineers. GIAC's goal is to make sure that an accredited security consultant possesses the knowledge needed to provide services in vital areas of system, data, and program security. GIAC certifications are acknowledged by companies and government organizations throughout the world including and the U.S. National Security Agency. Progent's GIAC-qualified IS security audit specialists can assist your business in the areas of:

  • Auditing Networks
  • Incident Response
  • Intrusion Detection
  • Web-based Application Security
  • SIEM solutions
Find out additional information concerning Progent's GIAC Information Assurance Services.

Get in Touch with a Security Specialist
To see how to contact a certified Progent security consultant for remote or onsite assistance in Florida, phone 1-800-993-9400 or visit Online Computer Support.

© 2002- 2019 Progent Corporation. All rights reserved.