Company IT networks in Florida can have fast and economical remote technical support from Progent's qualified security professionals to assist with the toughest security issues. Rates are reasonable, billing is per minute, sign-up is immediate, and support is world class. Progent also provides help for long-term projects that requires the expertise of senior security engineers with high-level industry credentials.

In case your Florida office is based away from major metropolitan neighborhoods like Jacksonville, Miami, Tampa, St. Petersburg, Hialeah, or Orlando, support from nearby certified security support specialists is often limited when there's a security disaster. This can cause a drop in productivity for your company, upset customers, idle workers, and distracted management. By utilizing Progent's remote support, you have access to a qualified security consultant who can provide assistance when you have to have it to get your system on line and restore your data.

Progent can assist you in a variety of ways in your efforts to protect your IT environment with support services ranging from security assessments to developing a company-wide security strategy. Progent provides affordable service to assist companies of any size to configure and maintain secure networks based on Microsoft Windows and Cisco products and that can include servers and desktops based on UNIX or Linux platforms plus BYOD users with Apple handhelds or Android or Windows Phone devices.

Progent can also assist you to outsource spam filtering and protection from email-borne assaults. Email Guard is Progent's email filtering and encryption solution that incorporates the technology of leading information security companies to provide web-based management and comprehensive protection for all your email traffic. The powerful structure of Progent's Email Guard combines cloud-based filtering with a local security gateway device to offer advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The cloud filter serves as a preliminary barricade and keeps the vast majority of threats from making it to your network firewall. This decreases your vulnerability to inbound threats and conserves network bandwidth and storage space. Email Guard's on-premises gateway device adds a deeper level of analysis for inbound email. For outgoing email, the on-premises security gateway provides anti-virus and anti-spam protection, protection against data leaks, and encryption. The on-premises gateway can also assist Microsoft Exchange Server to monitor and protect internal email that originates and ends inside your security perimeter.

Progent's security professionals are available online or on site to offer a variety of urgent or project-based computer security services including:

  • Perform extensive network security audits
  • Recuperate rapidly after virus and worm attacks
  • Install and troubleshoot firewalls
  • Configure safe methods for remote and mobile access
  • Deploy advanced solutions for protection against viruses, spam and directory harvest attacks
  • Develop a company-wide security strategy with proactive security monitoring
  • Provide comprehensive Call Center Support
  • Help Create an effective data backup and restore plan built around Data Protection Manager (DPM) backup technology
If your business has an urgent requirement for computer security support, go to Progent's Emergency Online Network Support.

Progent's engineers offer advanced support in key facets of system security that include analysis, firewall/VPN support, and advanced security planning.

System Security Audits
Progent's certified security engineers can evaluate the effectiveness of your existing computer security systems by performing comprehensive remote automated analysis via sophisticated utilities and proven procedures. Progent's skill in administering this testing saves your company time and money and offers an objective picture of security holes. The knowledge your business gains can make up the foundation of a security plan that will permit your information system to operate dependably and react rapidly to future risks.

Automated Network Security Analysis
Progent provides consulting in the application of security analysis utilities including Microsoft Baseline Security Analyzer and GFI LANguard Network Security Scanner for affordably performing a set of automatic network testing checks to identify potential security weaknesses. Progent has extensive knowledge of other network analysis tools including NMAP, AMAP application mapper, eEye Vulnerability Scanner, as well as tools such as Metasploit Framework, Netcat, and Nikto. Progent can show you how to understand audit reports and respond effectively.

Progent can show you how to build protection into your business operations, configure auditing software, define and implement a secure system architecture, and suggest procedures to maximize the security of your IT system. Progent's security engineers are able to help you set up a firewall, design secure remote access to email and business applications, and integrate VPN. Find out more concerning Progent's network security analysis.

Security Inventory Packages for Small Companies
Progent offers two ultra-affordable security inventory service packages intended to allow small businesses to receive an independent network security evaluation from a qualified security expert. With Progent's External Network Security Inventory Checkup, a security engineer runs a comprehensive test of your network from outside your company firewall to determine potential risks in the security posture you present to the outside world. With Progent's Internal Security Inventory Checkup, an engineer executes a system scan from a secure machine inside your company firewall to evaluate your exposure to inside threats. The two security inventory packages are configured and run from a secured remote site. The process is managed by a consultant with high-level security credentials and who generates a report that details and interprets the information captured by the scan and suggests practical remediation where called for.

Network Intrusion Testing Support Services
Stealth penetration checking is a key part of any serious IT system security strategy. Progentís security professionals can run thorough intrusion tests without the knowledge of your organization's internal IT resources. Stealth penetration testing uncovers whether current security monitoring systems such as intrusion detection alerts and event log monitoring are correctly configured and consistently checked. Learn additional information on Progent's stealth security penetration testing support services.

Firewalls and VPN Support
Progent's background in security solutions includes in-depth familiarity with major firewalls and Virtual Private Network technology from a variety of vendors such as Cisco, Microsoft, and Juniper. Progent can provide the services of engineers who have earned key industry accreditations including CCIE and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Configuration and Troubleshooting
The new ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver substantially more performance than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX security appliances for new installations. Since Cisco's acquisition of Sourcefire, the whole line of Cisco ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort technology, which is the market's most deployed network intrusion protection system. Firepower services provide enhanced features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can help you to maintain your current PIX or Cisco ASA 5500 firewalls and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite help with ASA 5500-X firewalls with Firepower Services and can help your business to design, deploy, optimize, administer and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Learn more details about Cisco ASA 5500-X Firewalls with Firepower integration and troubleshooting support.

Cisco Network Security and Virtual Private Network Engineering Expertise
Cisco's network security and offsite access technology represent a complete range of manageable security products to help safeguard your wired and wireless network infrastructure. Cisco's VPN line includes routers, firewalls, intrusion detection systems and VPN appliances. Progent's expert staff of consultants includes experienced engineers with Cisco's Certified Internetwork Expert and CCNP qualifications who can help your company to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that fit best with your business goals. Read more information about Progent's Support Expertise for Cisco Security and Virtual Private Network Products.

Engineering Expertise for Additional Firewall and VPN Products
Progent offers small and medium size companies expert consulting for Intrusion Protection products and IPsec VPN solutions from leading firewall and Virtual Private Network security vendors such as Check Point Software, Juniper, and Symantec. Progent can show you how to design a comprehensive security plan and choose the right technologies from a variety of suppliers to support your security goals while sticking within your budget limits.

Expert Security Design
Every business ought to have a carefully considered security program that includes both pre-attack procedures and reaction planning. The pre-attack plan is a collection of steps intended to reduce security weaknesses. The post-attack plan assists your company's network security engineers to assess the impact caused by an attack, fix the damage, record the experience, and get the IT network operational as quickly as feasible.

Progent's expert information security consultants can to help your company to run a full risk evaluation and create a computer security plan to implement security processes and mechanisms to minimize ongoing assaults and threats.

CISM Certified Information Security Consulting Services
The CISM committee describes the core capabilities and international standards of performance that information security managers are required to learn. CISM provides business management the confidence that consultants who have earned their CISM certification possess the background and capability to provide efficient security administration and support consulting. Progent can provide the expertise of CISM qualified security consultants to help companies with:

  • Network Security Strategies
  • Risk Analysis
  • Network Security Implementation Management
  • IS Security Management
  • Response Planning
Read additional details concerning Progent's CISM Accredited Network Security Support Expertise.

CISSP Certified Security Engineering Services
CISSP denotes mastery of a global standard for information security. The American National Standards Institute has granted certification recognition in the field of information protection stipulated by ISO/IEC 17024. Progent offers the services of security professionals who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified professional to help your company in a variety security fields such as:

  • Security Administration Practices
  • Security Infrastructure and Paradigms
  • Access Management Solutions and Methodology
  • Software Development Security
  • Secure Operations
  • Site Security
  • Encryption/Decryption Mechanisms
  • Telecom, LAN and Internet Security
  • Business Continuity Planning
Read more information concerning Progent's CISSP Qualified IS Security Engineering Professionals.

ISSAP Qualified Secure Information System Architecture Engineering Services
Progent's ISSAP certified IT architecture professionals are experts who have earned ISSAP status as a result of rigorous examination and significant experience with network security architecture. The Information System Security Architecture Professional (ISSAP) credential represents demonstrated skill in the most in-depth demands of information security architecture within the wider scope of information security knowledge required for CISSP certification. Progent's ISSAP-certified security specialists can help your business with all aspects of architecture security including.

  • Access Control Mechanisms and Techniques
  • Phone System and System Infrastructure Security
  • Encryption/Decryption Options
  • Needs Analysis and Security Standards
  • Business Continuity Planning and DRP
  • Site Security
Find out more information about Progent's ISSAP Qualified Secure System Architecture Support Expertise.

CISA Accredited Network Security Auditing Engineering Assistance
The Certified Information Systems Auditor (CISA) credential is an important achievement that indicates expertise in IS security auditing. Accredited by ANSI, the CISA accreditation has candidates pass an extensive test given by the ISACA professional group. Progent's CISA network security audit specialists can help your IT organization with:

  • Information Systems Audit Process
  • Information Technology Enforcement
  • Network Assets and Architecture Planned Useful Life
  • Information Technology Service Delivery
  • Safeguarding Data Resources
  • Disaster Recovery Planning
Get more details about Progent's CISA Qualified Information System Security Auditing Consulting Services.

Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC program was established by ISACA to verify a consultant's ability to plan, deploy, and support information system controls to mitigate risk. Progent offers the services of a CRISC-certified engineer to help you to create and execute a business continuity strategy that follows industry best practices identified by CRISC and geared to match your company's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC-certified network risk management engineers offer a range of risk evaluation services such as:

  • Collect data and review documentation to help identify major risk scenarios
  • Identify legal, industry, and business mandates and organizational policies associated with your information system to determine their possible influence on your business goals
  • Identify potential vulnerabilities for your business processes to help in analyzing your corporate risk
  • Create a risk awareness initiative and provide seminars to ensure your stakeholders appreciate IS risk so they can contribute to your risk management process
  • Connect key risk scenarios to related business processes to help assign risk ownership
  • Determine risk appetite with your senior management and major stakeholders to ensure they align
Find out additional information concerning Progent's CRISC Consultants.

GIAC Accredited IS Security Consulting Expertise
GIAC was founded in 1999 to certify the knowledge of information technology security professionals. GIAC's mission is to assure that a certified security consultant possesses the knowledge necessary to deliver services in critical areas of network, data, and application security. GIAC accreditations are recognized by companies and institutions all over the world including and the United States National Security Agency (NSA). Progent's GIAC IS security audit consultants can help your IT organization with:

  • Auditing Security Systems
  • Security Incident Response
  • Intrusion Detection
  • Web Services Security
  • SIEM solutions
Find out additional details concerning Progent's GIAC Information Assurance Services.

Get in Touch with a Progent Security Engineer
To learn how you can access a certified Progent security engineer for online or onsite assistance in Florida, call 1-800-993-9400 or go to Online Computer Help.














© 2002- 2017 Progent Corporation. All rights reserved.