Company IT networks in Florida can depend on fast and affordable online access to Progent's accredited security support specialists to help with critical security issues. Rates are competitive, charges are per minute, engagement is quick, and support is world class. Progent also offers assistance for complex engagements that requires the expertise of senior security consultants with top industry credentials.

In case your Florida office is situated some distance from major urban areas like Jacksonville, Miami, Tampa, St. Petersburg, Hialeah, or Orlando, support from nearby certified security consultants could be limited when you have a security disaster. This can cause a drop in income for your business, angry clients, idle workers, and defocused executives. By calling Progent's online services, you have access to a qualified security consultant ready to provide expertise when you have to have it to keep your system on line and recover your information.

Progent can help you at any level in your efforts to protect your information system with services that can range from security checks to creating a company-wide security plan. Progent offers economical service to assist businesses of all sizes to configure and maintain safe IT environments powered by Microsoft Windows and Cisco products and that may include servers and desktops based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus mobile users with Apple iOS iPhones and iPads or Android or Windows Phone handsets.

Progent can also show you how to outsource spam blocking and protection from email-borne attacks. Email Guard is Progent's email filtering and encryption solution that incorporates the technology of top data security vendors to deliver centralized control and comprehensive security for your email traffic. The hybrid structure of Email Guard combines a Cloud Protection Layer with a local security gateway appliance to provide advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. The cloud filter serves as a first line of defense and keeps the vast majority of threats from reaching your security perimeter. This reduces your vulnerability to inbound attacks and conserves system bandwidth and storage. ProSight Email Guard's onsite gateway device adds a deeper level of inspection for incoming email. For outbound email, the local security gateway provides AV and anti-spam filtering, protection against data leaks, and email encryption. The on-premises gateway can also enable Exchange Server to monitor and protect internal email that originates and ends inside your corporate firewall.

Progent's certified professionals are accessible remotely or on site to offer a variety of urgent or project-based computer security services which include:

If your network has an urgent need for IT security help, go to Progent's Emergency Remote Network Support.

Progent's security experts can deliver advanced services in key areas of network security that include security evaluation, firewalls and VPN, and advanced security planning.

Security Evaluation
Progent's expert security consultants can assess the strength of your current network protection environment through comprehensive remote automated testing via advanced utilities and proven procedures. Progent's experience in administering this service saves you money and assures a detailed portrayal of security holes. The information your business gains can be used as the foundation of a network protection strategy that will permit your information system to operate safely and respond rapidly to new risks.

Automated Network Vulnerability Audits
Progent provides expertise in the use of security evaluation packages such as Microsoft's MBSA and LANguard from GFI for affordably running a variety of automatic system testing scans to identify possible security vulnerabilities. Progent has broad experience with additional network analysis utilities such as NMAP, AMAP application mapper, eEye, as well as utilities such as Metasploit Framework, Netcat, and Nikto. Progent can help you to make sense of audit reports and respond appropriately.

Progent can show you how to build security into your company processes, install auditing applications, plan and implement a protected system environment, and suggest procedures to optimize the security of your IT system. Progent's security professionals are ready to show you how to configure a firewall, design safe remote access to email and data, and integrate VPN. Learn more about Progent's automated security assessment.

Security Inventory Service Packages for Small Businesses
Progent offers two ultra-affordable security inventory service packages designed to allow small businesses to receive an impartial network security assessment from a qualified security expert. With Progent's External Network Security Inventory Checkup, a security expert runs a comprehensive examination of your network from outside your firewall to uncover potential risks in the security profile you present to the public. With Progent's Internal Network Security Inventory Scan, a security expert runs a network scan from an authorized computer within your company firewall to determine your exposure to internal threats. The two security inventory services are configured and run from a protected external site. The project is managed by a consultant who has earned top security accreditations and who produces a document that details and analyzes the data collected by the scan and proposes practical improvements where called for.

Network Security Penetration Analysis Consulting
Stealth intrusion testing is a key part of any successful IT system security strategy. Progentís security experts can perform extensive intrusion tests without the knowledge of your company's in-house IT resources. Unannounced penetration checking uncovers whether current security monitoring systems such as intrusion incident warnings and event history analysis are correctly set up and consistently checked. Learn more concerning Progent's stealth penetration testing support services.

Firewall And Virtual Private Network (VPN) Expertise
Progent's background in network security technology includes in-depth familiarity with major firewalls and Virtual Private Network (VPN) technology offered by multiple vendors such as Cisco, Microsoft, and CheckPoint. Progent can provide the services of consultants with important networking certifications including CCIE and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Troubleshooting
The current ASA 5500-X Series of firewalls with Firepower Services offer substantially more performance than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX 500 security appliances for all new deployments. After Cisco's acquisition of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most popular network intrusion protection system. Firepower services provide enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can assist you to maintain your existing PIX or ASA 5500 firewalls or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite support for ASA 5500-X firewalls with Firepower Services and can assist you to design, deploy, tune, manage and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Read additional information about Cisco ASA 5500-X Firewalls with Firepower configuration and debugging support.

Cisco Security and Virtual Private Network Consulting Services
Cisco's security and remote access technology provide a complete line of manageable security solutions to help safeguard your wired and wireless network infrastructure. Cisco's Virtual Private Network line features switches, firewalls, intrusion detection systems and VPN concentrators. Progent's expert staff of consultants includes experienced engineers with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional certifications who can assist your organization to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that align most closely with your business objectives. Learn additional information about Progent's Consulting Expertise for Cisco Security Solutions and Virtual Private Network Appliances.

Support Expertise for Other Firewall and Virtual Private Network Solutions
Progent provides small and mid-size companies professional support for Intrusion Protection products and IPsec VPN technology from leading firewall and Virtual Private Network security companies such as Check Point Software, Juniper, and Symantec. Progent can show you how to design a comprehensive security strategy and select appropriate products from multiple vendors to support your security objectives while staying within your budget limits.

Progent's Low-Cost Managed Services for Information Security
Progent's affordable ProSight family of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection (EPP) service that utilizes cutting edge behavior machine learning tools to defend endpoint devices as well as physical and virtual servers against new malware assaults such as ransomware and file-less exploits, which easily escape traditional signature-matching anti-virus products. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and provides a unified platform to automate the complete malware attack lifecycle including blocking, infiltration detection, mitigation, remediation, and post-attack forensics. Key capabilities include single-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection (ESP) managed services deliver affordable multi-layer security for physical servers and virtual machines, desktops, mobile devices, and Exchange email. ProSight ESP utilizes adaptive security and advanced machine learning for round-the-clock monitoring and responding to security threats from all attack vectors. ProSight ESP delivers firewall protection, intrusion alerts, device management, and web filtering through cutting-edge technologies packaged within a single agent accessible from a unified control. Progent's data protection and virtualization experts can assist your business to plan and implement a ProSight ESP environment that meets your organization's specific needs and that helps you achieve and demonstrate compliance with legal and industry data protection standards. Progent will assist you specify and implement security policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alerts that call for urgent attention. Progent's consultants can also assist you to install and test a backup and disaster recovery system such as ProSight Data Protection Services so you can get back in business rapidly from a destructive cyber attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Exchange email filtering.

ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services from Progent offer small and mid-sized organizations a low cost end-to-end service for reliable backup/disaster recovery. Available at a low monthly cost, ProSight Data Protection Services automates and monitors your backup activities and allows rapid restoration of critical files, apps and VMs that have become lost or damaged as a result of component breakdowns, software glitches, natural disasters, human error, or malicious attacks such as ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, apps, system images, plus Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to an on-promises storage device, or to both. Progent's BDR specialists can deliver world-class expertise to set up ProSight DPS to to comply with regulatory requirements like HIPPA, FIRPA, PCI and Safe Harbor and, when needed, can assist you to recover your critical information. Learn more about ProSight DPS Managed Backup.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the technology of leading information security vendors to provide web-based management and world-class protection for all your email traffic. The powerful architecture of Progent's Email Guard combines cloud-based filtering with a local gateway appliance to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based malware. The Cloud Protection Layer serves as a first line of defense and blocks the vast majority of threats from making it to your security perimeter. This decreases your exposure to external threats and conserves network bandwidth and storage. Email Guard's onsite gateway device provides a deeper layer of analysis for incoming email. For outbound email, the on-premises gateway provides AV and anti-spam filtering, DLP, and email encryption. The local security gateway can also help Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends inside your corporate firewall. For more details, see ProSight Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small organization can have its critical servers and apps hosted in a secure fault tolerant data center on a fast virtual host configured and managed by Progent's network support experts. With Progent's ProSight Virtual Hosting service model, the client retains ownership of the data, the OS software, and the applications. Because the system is virtualized, it can be moved easily to an alternate hardware environment without a lengthy and difficult reinstallation procedure. With ProSight Virtual Hosting, you are not tied one hosting provider. Find out more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, maintain, retrieve and safeguard data related to your network infrastructure, procedures, applications, and services. You can instantly locate passwords or IP addresses and be alerted automatically about upcoming expirations of SSLs or domains. By updating and managing your network documentation, you can eliminate as much as half of time wasted trying to find vital information about your network. ProSight IT Asset Management includes a centralized location for holding and sharing all documents required for managing your business network like recommended procedures and How-To's. ProSight IT Asset Management also offers a high level of automation for collecting and associating IT data. Whether youíre planning enhancements, doing regular maintenance, or responding to a crisis, ProSight IT Asset Management gets you the information you require as soon as you need it. Learn more details about ProSight IT Asset Management service.

Certified Security Planning
Every company should develop a carefully considered security strategy that incorporates both pre-attack procedures and response plans. The proactive strategy is a set of mechanisms designed to minimize vulnerabilities. The reactive strategy helps your company's security engineers to assess the impact resulting from a security penetration, fix the network, record the event, and get business functions running as rapidly as feasible.

Progent's certified information security consultants can to assist you to perform a complete vulnerability evaluation and create a computer security plan to implement security processes and mechanisms to reduce future assaults and dangers.

CISM Certified Security Consulting Expertise
The Certified Information Security Manager (CISM) organization defines the basic capabilities and international standards of skill that information security managers are expected to learn. CISM gives executive management the confidence that those who have qualified for their CISM credential possess the background and knowledge to deliver efficient security management and consulting services. Progent can provide the services of CISM certified security consultants to help businesses with:

  • IS Security Strategies
  • Vulnerability Analysis
  • Network Security Implementation Management
  • Information Security Management
  • Recovery Planning
Find out additional information concerning Progent's CISM Qualified IS Security Support Expertise.

CISSP Accredited Security Engineering Support
CISSP certification denotes mastery of an international standard for network security. ANSI has awarded the CISSP credential accreditation in the area of information protection defined by ISO 17024. Progent can provide the services of security consultants who have qualified for CISSP accreditation. Progent can provide a CISSP-certified professional to help your enterprise in a broad range of security areas such as:

  • Security Management Procedures
  • Security Architecture and Paradigms
  • Access Management Solutions and Processes
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Data Encryption Mechanisms
  • Telecommunications, LAN and WAN Security
  • Business Continuity Preparedness
Read more details concerning Progent's CISSP Network Security Consulting Services.

ISSAP Certified Secure Network Architecture Engineering Support
Progent's ISSAP certified IT architecture professionals are consultants who have earned ISSAP Certification through rigorous testing and significant experience with network security design. The Information System Security Architecture Professional (ISSAP) credential indicates proven competence in the more challenging requirements of information security architecture bounded by the wider field of IS security knowledge required for CISSP accreditation. Progent's ISSAP-certified security specialists can help your company with all aspects of secure network architecture including.

  • Access Management Systems and Techniques
  • Telecom and Network Protection
  • Cryptography Solutions
  • Needs Evaluation and Security Criteria
  • Business Continuity Planning (BCP) and Disaster Recovery Planning
  • Hardware Security
Read additional details about Progent's ISSAP Certified Secure Information System Architecture Consulting Services.

CISA Certified Security Auditing Consulting Support
The Certified Information Systems Auditor (CISA) accreditation is a recognized achievement that indicates mastery in information system security auditing. Certified by ANSI, the CISA credential has candidates undergo a comprehensive examination given by the ISACA international professional group. Progent's CISA information security audit engineers are available to assist your business in the areas of:

  • IS Audit Services
  • Information Technology Enforcement
  • Network Assets and Architecture Lifecycle
  • Information Technology Service Delivery
  • Protecting Data Assets
  • Disaster Recovery Preparedness
Learn the details about Progent's CISA Certified Security Auditing Engineering Support.

CRISC Consultants
The CRISC certification program was established by ISACA in 2010 to verify an IT professional's ability to design, deploy, and maintain IS control mechanisms to mitigate risk. Progent offers the services of a CRISC-certified consultant to assist you to create and carry out a workplace continuity or disaster recovery plan that follows industry best practices identified by CRISC and geared to align with your organization's risk tolerance, business goals, and IT budget. Progent's CRISC-qualified IT risk management engineers can provide a variety of risk evaluation services such as:

  • Collect information and study documentation to help identify major vulnerabilities
  • Identify statutory, regulatory, and business mandates and organizational standards associated with your network to determine their potential influence on your strategic goals
  • Point out possible threats for your business processes to help in analyzing your enterprise risk
  • Create a risk awareness program and conduct seminars to make sure your organization appreciate IT risk so they can assist with your risk management program
  • Match identified risk vectors to your associated operational processes to help determine risk ownership
  • Validate risk appetite with your senior management and key stakeholders to make sure they match
Find out additional information about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Certified Security Engineering Expertise
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the knowledge of network security experts. GIAC's mission is to verify that a certified professional possesses the knowledge needed to deliver services in vital areas of system, data, and application program security. GIAC accreditations are acknowledged by companies and institutions all over the world including and the U.S. NSA. Progent's GIAC-qualified security audit experts are available to help your company with:

  • Auditing Perimeters
  • Security Incident Handling
  • Intrusion Detection
  • Web Application Security
  • SIEM solutions
Learn more details concerning Progent's GIAC Information Assurance Services.

Contact a Certified Security Engineer
To learn how to get in touch with a security consultant for remote or onsite assistance in Florida, call 1-800-993-9400 or visit Remote Network Support.














© 2002- 2018 Progent Corporation. All rights reserved.