Business information networks in Florida now have quick and economical remote technical support from Progent's certified security professionals to help with complex security issues. The cost is reasonable, charges are by the minute, sign-up is immediate, and support is world class. Progent also provides help for long-term projects that requires the services of senior security engineers with high-level security credentials.

In case your Florida company is located some distance from more populated urban areas such as Jacksonville, Miami, Tampa, St. Petersburg, Hialeah, or Orlando, the availability of nearby accredited network security professionals may be problematic when you have a crisis. This could mean a loss of revenue for your company, upset clients, idle employees, and distracted management. By contacting Progent's remote support, you have access to a qualified security engineer ready to offer expertise whenever you require it to keep your information system running and recover your information.

Progent can help you in your initiatives to guard your network with support that ranges from network security checks to developing a company-wide security strategy. Progent provides economical service to help businesses of all sizes to set up and manage protected IT environments powered by Microsoft Windows and Cisco technology and that can include servers and desktops running UNIX, Linux, Solaris, or Apple Mac OS X platforms as well as mobile clients with Apple iOS handhelds or Google Android or Windows Phone smart phones and tablets.

Progent can also show you how to outsource spam blocking and defense against e-mail-based attacks. Email Guard is Progent's email filtering and encryption solution that incorporates the technology of leading data security vendors to deliver centralized management and world-class protection for your inbound and outbound email. The hybrid architecture of Progent's Email Guard combines a Cloud Protection Layer with a local security gateway device to provide advanced defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-based malware. The cloud filter serves as a first line of defense and keeps most threats from reaching your network firewall. This decreases your exposure to inbound threats and saves system bandwidth and storage. ProSight Email Guard's onsite gateway device adds a deeper layer of analysis for inbound email. For outbound email, the onsite security gateway offers anti-virus and anti-spam protection, protection against data leaks, and encryption. The onsite security gateway can also enable Microsoft Exchange Server to monitor and safeguard internal email traffic that stays within your corporate firewall.

Progent's certified professionals are accessible online or on premises to offer a range of emergency or longer-term IT security services which include:

If your business has an urgent requirement for computer security support, refer to Progent's Urgent Remote Technical Help.

Progent's consultants can deliver advanced services in vital fields of network protection that include auditing, firewall and VPN solutions, and advanced security consulting.

Security Audits
Progent's certified security engineers can evaluate the strength of your existing computer security implementation through comprehensive remote automated testing via sophisticated software tools and proven procedures. Progent's skill in this testing saves your company consulting fees and offers an accurate portrayal of security holes. The knowledge your IT organization is provided can make up the foundation of a network protection strategy that can allow your network to run safely and respond quickly to new threats.

Automated Security Audits
Progent provides consulting in the application of security analysis packages such as MBSA and GFI LANguard for economically performing a variety of programmed network auditing checks to uncover potential security holes. Progent has broad knowledge of additional security auditing tools including NMAP, AMAP application mapper, eEye, as well as utilities like Metasploit, Hydra, and Nikto. Progent can show you how to understand audit reports and respond effectively.

Progent can help you design security into your business processes, configure auditing tools, define and deploy a protected system environment, and suggest procedures to maximize the security of your IT system. Progent's security consultants are available to help you configure a firewall, design secure remote access to email and business applications, and install virtual private network. Learn additional information about Progent's network security analysis.

Security Inventory Service Packages for Small Companies
Progent has put together two low-cost security inventory packages designed to allow small companies to get an objective network security assessment from a qualified security expert. With Progent's External Network Security Inventory Checkup, an engineer administers a comprehensive test of your network from outside your firewalled perimeter to uncover potential risks in the security posture you expose to the outside world. With Progent's Internal Security Inventory Checkup, a security engineer runs a system scan from an authorized machine inside your company firewall to uncover the risk to internal attacks. Both security inventory services are configured and executed from a protected external location. The project is directed by a consultant who has earned high-level security credentials and who produces a document that details and analyzes the information collected by the scan and suggests cost-effective remediation where called for.

Network Penetration Analysis Support Services
Stealth intrusion testing is a key component of any successful network security strategy. Progentís security professionals can run extensive intrusion tests without the awareness of your company's internal network support staff. Unannounced penetration checking shows whether current security defense tools such as intrusion incident warnings and event history monitoring are correctly configured and consistently checked. Find out additional information about Progent's stealth security penetration testing consulting.

Firewalls and VPN Solutions
Progent's expertise in security technology includes in-depth field work with major firewalls and Virtual Private Network (VPN) technology offered by a variety of vendors such as Cisco, Microsoft, and CheckPoint. Progent can provide the support of consultants with important networking certifications such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Integration and Troubleshooting
The latest generation of ASA 5500-X Family of firewalls with Firepower Services deliver substantially more value than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 firewalls for new deployments. Since Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X devices can be configured to enable Firepower Services, built on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system. Firepower services provide powerful new features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can assist you to maintain your legacy PIX or Cisco ASA 5500 security appliances and migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your business to plan, integrate, optimize, manage and debug firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. Learn more details about ASA Firewalls with Firepower configuration and troubleshooting support.

Cisco Security and VPN Engineering Expertise
Cisco's security and remote access technology represent a comprehensive range of easy-to-administer security solutions to help protect your wired and wireless network infrastructure. Cisco's VPN product family includes routers, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's expert staff of consultants includes field-proven specialists with Cisco Certified Internetwork Expert and CCNP qualifications who can help your company to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that fit best with your business objectives. Learn additional details concerning Progent's Engineering Services for Cisco Security Solutions and Virtual Private Network Products.

Support Expertise for Other Firewall and VPN Products
Progent offers small and mid-size businesses expert support for Intrusion Protection Systems and IPsec VPN technology from major firewall and Virtual Private Network security vendors including WatchGuard, Juniper Networks, and Symantec. Progent can help you design a comprehensive security plan and select appropriate products from a variety of suppliers to achieve your security objectives while sticking within your budget limits.

Progent's Flat-rate Managed Services for Information Assurance
Progent's affordable ProSight portfolio of managed services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates next generation behavior-based machine learning tools to guard endpoint devices as well as servers and VMs against modern malware attacks such as ransomware and email phishing, which easily escape traditional signature-matching AV products. ProSight Active Security Monitoring safeguards local and cloud-based resources and offers a single platform to manage the entire threat lifecycle including protection, infiltration detection, mitigation, cleanup, and post-attack forensics. Key features include one-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection services deliver ultra-affordable in-depth security for physical and virtual servers, workstations, mobile devices, and Exchange Server. ProSight ESP utilizes adaptive security and advanced machine learning for round-the-clock monitoring and reacting to cyber threats from all vectors. ProSight ESP provides two-way firewall protection, penetration alerts, endpoint control, and web filtering through leading-edge technologies packaged within one agent accessible from a single console. Progent's security and virtualization experts can assist your business to design and implement a ProSight ESP deployment that addresses your organization's unique requirements and that helps you achieve and demonstrate compliance with legal and industry data protection regulations. Progent will help you specify and implement policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alerts that require immediate attention. Progent's consultants can also assist you to install and test a backup and disaster recovery system such as ProSight Data Protection Services so you can recover quickly from a potentially disastrous cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Microsoft Exchange email filtering.

ProSight DPS: Managed Backup
ProSight Data Protection Services offer small and medium-sized businesses an affordable end-to-end solution for secure backup/disaster recovery (BDR). For a fixed monthly price, ProSight DPS automates and monitors your backup activities and allows rapid restoration of critical data, applications and virtual machines that have become lost or damaged as a result of component failures, software glitches, disasters, human error, or malware attacks such as ransomware. ProSight DPS can help you protect, recover and restore files, folders, applications, system images, plus Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to an on-promises device, or to both. Progent's BDR consultants can provide world-class support to configure ProSight Data Protection Services to to comply with government and industry regulatory requirements like HIPPA, FIRPA, and PCI and, when needed, can assist you to recover your critical information. Find out more about ProSight DPS Managed Cloud Backup.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the technology of leading information security companies to provide centralized control and world-class security for all your email traffic. The hybrid structure of Progent's Email Guard managed service integrates cloud-based filtering with a local gateway appliance to provide complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. Email Guard's Cloud Protection Layer serves as a first line of defense and blocks most threats from reaching your security perimeter. This reduces your vulnerability to inbound attacks and saves system bandwidth and storage. Email Guard's onsite gateway device provides a deeper layer of inspection for incoming email. For outgoing email, the onsite gateway offers AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also help Microsoft Exchange Server to monitor and safeguard internal email traffic that originates and ends within your security perimeter. For more information, visit ProSight Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small business can have its critical servers and apps hosted in a secure fault tolerant data center on a fast virtual host set up and maintained by Progent's IT support professionals. With Progent's ProSight Virtual Hosting model, the customer owns the data, the operating system software, and the apps. Because the environment is virtualized, it can be moved immediately to an alternate hosting environment without requiring a lengthy and technically risky reinstallation procedure. With ProSight Virtual Hosting, your business is not locked into one hosting service. Find out more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, find and safeguard data about your network infrastructure, procedures, applications, and services. You can instantly find passwords or serial numbers and be warned automatically about impending expirations of SSLs or warranties. By updating and managing your IT infrastructure documentation, you can save up to 50% of time thrown away trying to find critical information about your IT network. ProSight IT Asset Management includes a common repository for storing and sharing all documents required for managing your network infrastructure such as standard operating procedures and How-To's. ProSight IT Asset Management also offers advanced automation for collecting and relating IT data. Whether youíre making enhancements, doing maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the knowledge you require as soon as you need it. Find out more about Progent's ProSight IT Asset Management service.

Certified Network Security Consulting
Any business ought to develop a thoroughly thought out security program that incorporates both pre-attack procedures and response plans. The pre-attack strategy is a collection of steps designed to minimize vulnerabilities. The reactive strategy helps your IT security personnel to assess the impact resulting from a security penetration, fix the network, document the event, and get the IT network operational as soon as feasible.

Progent's certified IT security engineers can to help your company to run a full vulnerability evaluation and create a company-wide security strategy to establish security processes and mechanisms to minimize future assaults and threats.

CISM Accredited Network Security Consulting Expertise
The Certified Information Security Manager (CISM) committee defines the core capabilities and international standards of skill that information security managers are required to learn. It gives business management the assurance that consultants who have qualified for their CISM credential have the background and knowledge to provide effective security management and consulting services. Progent offers the services of CISM certified security consultants to help companies with:

  • IS Security Governance
  • Vulnerability Analysis
  • IS Security Implementation Management
  • IS Security Administration
  • Recovery Management
Learn additional details concerning Progent's CISM Accredited Security Consulting Expertise.

CISSP Certified Security Consulting Expertise
CISSP certification denotes mastery of a global standard for network security. The American National Standards Institute has granted certification recognition in the area of information security under ISO/IEC 17024. Progent can provide the services of security experts who have qualified for CISSP certification. Progent can provide a CISSP-certified expert to help your business in a broad range of security fields including:

  • Security Management Procedures
  • Security Architecture and Models
  • Access Control Solutions and Methodology
  • Software Development Security
  • Secure Operations
  • Site Security
  • Cryptography Technology
  • Telecommunications, Network and WAN Security
  • Business Continuity Planning
Read additional information concerning Progent's CISSP Accredited Security Consulting Services.

ISSAP Qualified Secure Network Architecture Consulting Services
Progent's ISSAP certified information system architecture engineers are experts who have earned ISSAP Certification as a result of thorough testing and significant work with information security design. The Information System Security Architecture Professional (ISSAP) certification represents demonstrated mastery in the most in-depth demands of IS security architecture within the broader field of IS security knowledge needed for CISSP certification. Progent's ISSAP-qualified security specialists can help your company with all phases of architecture security such as.

  • Access Management Mechanisms and Methodologies
  • Telecommunications and Network Infrastructure Protection
  • Data Encryption Options
  • Needs Evaluation and Security Criteria
  • Business Continuity Planning (BCP) and Disaster Recovery Planning
  • Site Security
Learn additional details about Progent's ISSAP Accredited Secure Information System Architecture Consulting Expertise.

CISA Accredited IS Security Auditing Consulting Support
The CISA accreditation is a globally recognized achievement that signifies expertise in information system security auditing. Accredited by the American National Standards Institute, the CISA accreditation has candidates pass an extensive test administered by the ISACA international professional association. Progent's CISA-qualified network security audit consultants are available to help your IT organization in the areas of:

  • Information Systems Audit Process
  • IT Administration
  • Systems and Infrastructure Planned Useful Life
  • IT Service Delivery
  • Protecting Information Resources
  • Business Continuity Preparedness
Get additional information concerning Progent's CISA Certified Information System Security Auditing Engineering Services.

Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC program was established by ISACA to verify a consultant's skills to plan, implement, and support IS controls to mitigate risk. Progent can provide the services of a CRISC-certified consultant to assist you to create and carry out a business continuity or disaster recovery strategy based on leading practices promoted by CRISC and geared to match your company's risk appetite, business goals, and budgetary guidelines. Progent's CRISC IT risk mitigation specialists can provide a variety of risk evaluation services such as:

  • Gather information and review documentation to evaluate major vulnerabilities
  • Identify legal, regulatory, and business mandates and company policies associated with your network to determine their possible impact on your business goals
  • Point out potential threats for your business workflows to assist in evaluating your corporate risk
  • Develop a risk awareness initiative and provide training to ensure your stakeholders appreciate IS risk so they can assist with your risk control process
  • Connect key risk vectors to your associated operational procedures to help assign risk responsibility
  • Determine risk appetite with your senior leadership and major stakeholders to ensure they match
Find out additional details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Accredited Information System Security Engineering Support
GIAC (Global Information Assurance Certification) was established in 1999 to certify the skill of network security professionals. GIAC's goal is to assure that a certified professional possesses the knowledge appropriate to deliver support in important areas of system, data, and application software security. GIAC certifications are acknowledged by businesses and government organizations around the world including and the United States NSA. Progent's GIAC-certified IS security audit experts can assist your business in the areas of:

  • Assessing Perimeters
  • Incident Response
  • Intrusion Detection
  • Web-based Services Security
  • SIEM solutions
Find out additional information concerning Progent's GIAC Information Assurance Support.

Get in Touch with a Security Engineer
To see how to get in touch with a certified Progent security consultant for remote or onsite help in Florida, phone 1-800-993-9400 or go to Online Computer Support.














© 2002- 2018 Progent Corporation. All rights reserved.