Small business networks in the state of Florida can have quick and affordable online technical support from Progent's certified security experts to fix complex security problems. The cost is reasonable, billing is by the minute, sign-up is quick, and service is world class. Progent also offers assistance for long-term engagements that demand the services of seasoned security engineers with top industry certifications.

In case your Florida office is situated some distance from major urban neighborhoods such as Jacksonville, Miami, Tampa, St. Petersburg, Hialeah, or Orlando, contact with nearby accredited security professionals may be problematic during an urgent situation. This could mean a drop in productivity for your business, angry clients, idle employees, and distracted executives. By utilizing Progent, you have access to a certified security professional who can provide help whenever you require it to get your computer network running and recover your information.

Progent can help you in your efforts to defend your IT environment with services that can range from security audits to creating a company-wide security plan. Progent offers affordable service to help small and midsize companies to configure and maintain secure IT environments powered by Microsoft Windows and Cisco technology and that may include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X operating systems plus mobile clients with Apple iPhones and iPads or Google Android or Windows Phone smart phones and tablets.

Progent can also show you how to outsource spam blocking and protection from email-borne assaults. Email Guard is Progent's email filtering and encryption solution that incorporates the technology of top data security vendors to deliver web-based management and comprehensive security for your inbound and outbound email. The powerful structure of Email Guard combines cloud-based filtering with an on-premises gateway appliance to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based threats. The cloud filter serves as a first line of defense and keeps the vast majority of threats from making it to your network firewall. This decreases your vulnerability to external attacks and conserves system bandwidth and storage. ProSight Email Guard's onsite gateway appliance provides a deeper level of analysis for inbound email. For outgoing email, the local gateway offers AV and anti-spam filtering, policy-based Data Loss Prevention, and encryption. The on-premises security gateway can also enable Exchange Server to track and safeguard internal email that stays within your security perimeter.

Progent's certified consultants are accessible remotely or on premises to offer a range of urgent or longer-term network security services which include:

If your network has an urgent requirement for computer security help, refer to Progent's Urgent Remote Network Support.

Progent's support professionals can deliver world-class support in key facets of network protection including analysis, firewall and VPN expertise, and advanced security planning.

Security Evaluation
Progent's expert security engineers can evaluate the strength of your current network protection systems by performing comprehensive remote automated testing based on sophisticated software tools and tested procedures. Progent's experience in this testing saves you consulting fees and assures a detailed portrayal of security holes. The knowledge your company gains can form the foundation of a security strategy that can allow your network to run dependably and respond rapidly to future threats.

Automated Vulnerability Analysis
Progent offers consulting in the use of security evaluation software including MBSA and GFI LANguard NSS for affordably running a variety of programmed network testing scans to uncover potential security vulnerabilities. Progent has extensive experience with other security auditing products such as NMAP Port Scanner, AMAP Application Scanner, eEye, plus tools such as SolarWinds, Netcat, Hydra, and Nikto. Progent can help you to understand audit reports and react effectively.

Progent can show you how to design protection into your business processes, install scanning applications, define and implement a protected system environment, and recommend policies to maximize the safety of your IT system. Progent's security engineers are available to show you how to configure a firewall, implement safe remote connectivity to email and data, and install VPN. Find out additional information on Progent's automated security audits.

Security Inventory and Evaluation Packages for Small Companies
Progent offers two ultra-affordable security inventory bundles designed to enable small businesses to receive an independent security evaluation from an accredited security consultant. With Progent's External Security Inventory Checkup, a security expert administers a comprehensive examination of your IT infrastructure from outside your company firewall to determine possible weaknesses in the security posture you present to the public. With Progent's Internal Security Inventory Checkup, a certified security professional executes a network scan from an authorized machine within your firewall to assess the risk to inside attacks. Both security inventory services are set up and run from a secured external location. The project is managed by an engineer with top security accreditations and who generates a report that details and analyzes the data collected by the scan and suggests cost-effective remediation where called for.

Network Security Penetration Testing Consulting
Stealth penetration testing is an important part of any serious network security plan. Progentís security professionals can run extensive penetration checks without the knowledge of your organization's in-house network support staff. Unannounced penetration testing shows whether current security monitoring systems such as intrusion detection warnings and event log monitoring are correctly set up and consistently checked. Find out more on Progent's stealth penetration testing consulting.

Firewall And Virtual Private Network (VPN) Solutions
Progent's background in security solutions encompasses in-depth field work with leading firewalls and Virtual Private Network (VPN) products offered by multiple vendors such as Cisco, Microsoft, and Symantec. Progent offers the services of engineers who have earned key networking certifications including Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Troubleshooting
The new Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver substantially more performance than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX security appliances for new installations. Following Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X devices can be configured to support Firepower Services, built on Sourcefire's Snort product, which is the world's most deployed intrusion protection system. Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can help you to maintain your current PIX or ASA 5500 security appliances or migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your company to design, integrate, optimize, administer and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Learn more details about ASA 5500-X Firewalls with Firepower integration and troubleshooting services.

Cisco Network Security and VPN Support Services
Cisco's security and remote connection technology offer a comprehensive range of manageable security solutions to help protect your wired and wireless network infrastructure. Cisco's VPN line features switches, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's expert consulting staff includes field-proven engineers with Cisco CCIE and CCNP certifications who are able to help your company to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that align most closely with your company goals. Learn additional information about Progent's Consulting Expertise for Cisco Security Solutions and Virtual Private Network Appliances.

Consulting Services for Other Firewall and Virtual Private Network Solutions
Progent offers small and medium size companies expert consulting for Intrusion Protection Systems and IPsec VPN products from leading firewall and Virtual Private Network security vendors including WatchGuard, Juniper, and Symantec. Progent can show you how to create a comprehensive security plan and select the right products from a variety of vendors to achieve your security goals while sticking within your budget restraints.

Progent's Low-Cost Managed Services for Information Assurance
Progent's low-cost ProSight portfolio of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services available from Progent include:
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that incorporates the technology of top information security vendors to provide web-based management and comprehensive protection for all your email traffic. The powerful architecture of Email Guard managed service integrates a Cloud Protection Layer with a local gateway appliance to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. Email Guard's cloud filter acts as a first line of defense and keeps the vast majority of unwanted email from making it to your security perimeter. This decreases your vulnerability to external attacks and saves system bandwidth and storage. Email Guard's on-premises gateway appliance provides a deeper level of inspection for inbound email. For outgoing email, the onsite gateway provides AV and anti-spam filtering, protection against data leaks, and email encryption. The on-premises security gateway can also assist Microsoft Exchange Server to monitor and protect internal email traffic that originates and ends within your security perimeter. For more details, visit ProSight Email Guard spam and content filtering.

ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes next generation behavior-based analysis tools to guard endpoint devices and servers and VMs against modern malware attacks like ransomware and email phishing, which easily escape legacy signature-matching anti-virus products. ProSight Active Security Monitoring protects local and cloud-based resources and offers a unified platform to manage the entire malware attack lifecycle including blocking, infiltration detection, containment, cleanup, and post-attack forensics. Top capabilities include one-click rollback using Windows Volume Shadow Copy Service and real-time network-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.

ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services provide small and mid-sized businesses an affordable and fully managed service for reliable backup/disaster recovery. For a low monthly price, ProSight DPS automates and monitors your backup activities and allows rapid restoration of critical data, applications and virtual machines that have become lost or damaged due to hardware breakdowns, software glitches, disasters, human mistakes, or malicious attacks such as ransomware. ProSight DPS can help you back up, recover and restore files, folders, applications, system images, as well as Hyper-V and VMware images. Critical data can be backed up on the cloud, to a local device, or to both. Progent's BDR consultants can deliver advanced expertise to set up ProSight Data Protection Services to to comply with regulatory requirements such as HIPPA, FIRPA, PCI and Safe Harbor and, when needed, can assist you to recover your critical information. Read more about ProSight Data Protection Services Managed Cloud Backup.

ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, update, find and protect information about your network infrastructure, processes, applications, and services. You can instantly locate passwords or serial numbers and be alerted automatically about upcoming expirations of SSLs or warranties. By cleaning up and managing your network documentation, you can save as much as 50% of time thrown away looking for critical information about your IT network. ProSight IT Asset Management features a common location for holding and collaborating on all documents related to managing your network infrastructure like standard operating procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for collecting and relating IT data. Whether youíre planning improvements, performing regular maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the knowledge you need the instant you need it. Find out more details about Progent's ProSight IT Asset Management service.

Expert Security Planning
Any business ought to develop a thoroughly thought out security program that incorporates both pre-attack processes and reaction planning. The pre-attack plan is a set of procedures that help to minimize vulnerabilities. The post-attack strategy assists your company's network security personnel to evaluate the impact caused by an attack, fix the system, record the event, and get business functions running as quickly as feasible.

Progent's expert IT security engineers are available to assist you to perform a full vulnerability assessment and create a network security strategy to implement security processes and mechanisms to mitigate future attacks and dangers.

CISM Qualified Network Security Support Services
The CISM organization describes the basic capabilities and global standards of performance that IT security professionals are required to learn. It gives executive management the assurance that consultants who have earned their CISM certification have the background and knowledge to deliver efficient security management and consulting consulting. Progent can provide the expertise of CISM certified security professionals to help businesses with:

  • Information Security Governance
  • Risk Analysis
  • Network Security Implementation Management
  • Network Security Management
  • Recovery Planning
Learn additional information about Progent's CISM Information Security Support Professionals.

CISSP Qualified Security Engineering Expertise
CISSP recognizes mastery of a worldwide standard for information security. ANSI has granted the CISSP credential accreditation in the field of data security defined by ISO 17024. Progent offers access to of security consultants who have earned CISSP certification. Progent can give you access to a CISSP-certified expert to help your enterprise in a variety security fields including:

  • Security Management Practices
  • Security Architecture and Paradigms
  • Access Management Solutions and Processes
  • Software Development Security
  • Secure Operations
  • Physical Security
  • Encryption/Decryption Mechanisms
  • Telecom, LAN and Internet Security
  • Disaster Recovery Preparedness
Find out more details about Progent's CISSP Accredited Information Security Engineering Professionals.

ISSAP Accredited Secure Information System Architecture Engineering Assistance
Progent's ISSAP certified system architecture professionals are consultants who have been awarded ISSAP status as a result of thorough examination and extensive work with network security architecture. The Information System Security Architecture Professional (ISSAP) certification represents proven competence in the most challenging demands of information security architecture bounded by the broader scope of IS security expertise needed for CISSP certification. Progent's ISSAP-qualified security experts can help your business with all aspects of architecture security such as.

  • Access Control Mechanisms and Methodologies
  • Telecom and Network Protection
  • Data Encryption Solutions
  • Requirements Analysis and Security Standards
  • BCP and Disaster Recovery Planning
  • Physical Security
Find out more information about Progent's ISSAP Accredited Secure Information System Architecture Engineering Professionals.

CISA Certified Information System Security Auditing Consulting Assistance
The Certified Information Systems Auditor (CISA) accreditation is a prestigious achievement that represents expertise in information system security auditing. Accredited by ANSI, the CISA credential has consultants undergo a comprehensive test administered by the ISACA international professional association. Progent's CISA-qualified information security audit engineers are available to help your company with:

  • Information Systems Audit Services
  • IT Governance
  • Network Assets and Infrastructure Lifecycle
  • Information Technology Support
  • Safeguarding Information Assets
  • Disaster Recovery Planning
Find out additional information about Progent's CISA Accredited Security Auditing Engineering Support.

CRISC Experts
The CRISC certification program was initiated by ISACA to validate a consultant's skills to design, implement, and maintain information system controls to reduce risk. Progent offers the services of a CRISC-certified consultant to assist you to develop and execute a business continuity strategy based on leading practices identified by CRISC and crafted to align with your organization's risk appetite, business objectives, and IT budget. Progent's CRISC-certified IT risk mitigation engineers can provide a variety of risk identification services such as:

  • Gather data and review documentation to help identify major vulnerabilities
  • Inventory legal, regulatory, and business mandates and organizational standards related to your information system to determine their possible impact on your business objectives
  • Identify potential vulnerabilities for your operational workflows to help in evaluating your corporate risk
  • Create a risk awareness initiative and provide training to make sure your stakeholders understand IT risk so they can contribute to your risk control program
  • Connect identified risk scenarios to related operational processes to help assign risk ownership
  • Validate risk appetite with your senior management and key stakeholders to make sure they align
Read additional information about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Accredited Security Consulting Expertise
GIAC was established in 1999 to validate the knowledge of information technology security professionals. GIAC's goal is to assure that a certified professional possesses the skills appropriate to deliver services in vital categories of system, information, and application security. GIAC certifications are recognized by companies and institutions around the world including and the U.S. NSA. Progent's GIAC security audit engineers can assist your company in the areas of:

Find out additional details about Progent's GIAC Information Assurance Services.

Talk to a Security Engineer
To see how you can get in touch with a certified security engineer for online or on-premises assistance in Florida, call 1-800-993-9400 or visit Online Network Help.














© 2002- 2018 Progent Corporation. All rights reserved.