Business information networks in the state of New Mexico can now get fast and economical remote access to Progent's certified security experts to help with critical security problems. Rates are reasonable, billing is by the minute, sign-up is immediate, and service is world class. Progent also provides help for complex projects that demand the services of seasoned security consultants with top security certifications.

In case your New Mexico company is based away from more populated metropolitan neighborhoods such as Albuquerque, Las Cruces, Santa Fe, or Rio Rancho, access to nearby certified network security experts is often problematic when there's an urgent situation. This can cause a loss of revenue for your business, angry customers, idle employees, and distracted management. By calling Progent's remote support, you have access to a certified security professional who can deliver assistance whenever you require it to keep your network running and salvage your data.

Progent can help you in a variety of ways in your initiatives to protect your IT environment with services that can range from network security audits to creating a comprehensive security strategy. Progent offers economical support to assist businesses of all sizes to design and maintain safe networks based on Microsoft Windows and Cisco technology and that may include computers running UNIX or Linux operating systems plus BYOD users with Apple handhelds or Google Android or Windows Phone smart phones and tablets.

Progent can also assist you to outsource spam blocking and protection from e-mail-based security threats. Email Guard is Progent's email security solution that uses the technology of top data security vendors to deliver centralized management and comprehensive security for your inbound and outbound email. The hybrid architecture of Email Guard combines cloud-based filtering with an on-premises gateway device to provide complete defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-based malware. The cloud filter serves as a preliminary barricade and keeps the vast majority of unwanted email from making it to your security perimeter. This decreases your exposure to external threats and saves network bandwidth and storage space. Email Guard's onsite security gateway appliance adds a further layer of analysis for inbound email. For outgoing email, the local gateway provides anti-virus and anti-spam protection, protection against data leaks, and encryption. The onsite gateway can also help Exchange Server to track and safeguard internal email that originates and ends inside your security perimeter.

Progent's certified professionals are available remotely or on site to provide a range of emergency or longer-term IT security services such as:

  • Run thorough security audits
  • Clean up quickly after serious security breaches
  • Configure effective firewalls
  • Implement safe techniques for remote and mobile access
  • Deploy advanced utilities for protection against viruses, spam and DHAs
  • Develop a comprehensive security plan with round-the-clock network monitoring
  • Offer comprehensive Call Center Support
  • Help Develop a practical data backup and disaster recovery solution centered on Microsoft DPM automated backup capability
If your company has an immediate requirement for IT security help, go to Progent's Urgent Remote Network Help.

Progent's engineers offer world-class support in key areas of computer protection that include auditing, firewalls and VPN, and high-level security consulting.

Security Audits
Progent's certified security engineers can assess the effectiveness of your existing computer security implementation through exhaustive remote automated testing via advanced software tools and tested techniques. Progent's experience in administering this testing saves your company money and assures a detailed picture of weaknesses. The knowledge your business gains can make up the basis of a network protection strategy that can allow your network to operate safely and react quickly to new threats.

Automated Network Vulnerability Evaluation
Progent provides expertise in the use of security auditing products such as Microsoft's MBSA and LANguard from GFI for economically performing a variety of automatic network auditing checks to identify possible security problems. Progent has broad knowledge of additional security analysis products such as NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, plus tools such as Metasploit Framework, Netcat, and Nikto. Progent can help you to understand testing reports and respond appropriately.

Progent can show you how to build security into your business operations, install scanning software, define and implement a protected system environment, and recommend policies to optimize the security of your network. Progent's security consultants are available to show you how to configure a firewall, implement secure remote connectivity to email and data, and integrate VPN. Find out additional information concerning Progent's automated security analysis.

Security Inventory Scanning Bundles for Small Businesses
Progent offers two low-cost security inventory service packages designed to enable small companies to get a professional network security evaluation from a qualified security expert. With Progent's External Network Security Inventory Scan, a security engineer runs an extensive examination of your network from outside your firewall to uncover possible weaknesses in the security profile you expose to the outside world. With Progent's Internal Network Security Inventory Scan, a security expert executes a network scan from a secure machine inside your company firewall to determine your exposure to internal attacks. The two security inventory services are set up and run from a secured external site. The process is directed by an engineer who has earned top security credentials and who generates a report that details and interprets the data captured by the scan and proposes practical improvements where called for.

Stealth Intrusion Testing Consulting
Stealth intrusion checking is a key part of any serious IT system security strategy. Progentís security professionals can perform thorough penetration checks without the awareness of your organization's internal network support staff. Stealth penetration checking uncovers whether current security defense systems such as intrusion incident warnings and event history analysis are properly set up and consistently checked. Learn more concerning Progent's network security penetration analysis support services.

Firewalls and VPN Solutions
Progent's expertise in security solutions includes extensive field work with major firewalls and Virtual Private Network (VPN) products from multiple vendors including Cisco, Microsoft, and Symantec. Progent can provide the services of consultants who have earned key industry accreditations including CCIE and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Configuration and Debugging
The current Cisco ASA 5500-X Family of firewalls with Firepower Services provide significantly more performance than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX security appliances for new installations. Since Cisco's acquisition of Sourcefire, the whole line of ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort product, which is the market's most popular network intrusion protection system (IPS). Firepower services bring enhanced features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can assist you to manage your existing PIX or Cisco ASA 5500 firewalls and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your business to plan, configure, tune, manage and troubleshoot firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Read more details about ASA 5500-X Firewalls with Firepower Services integration and troubleshooting services.

Cisco Network Security and VPN Consulting Expertise
Cisco's network security and remote connection products represent a full line of easy-to-administer security solutions to help safeguard your local and remote information system. Cisco's Virtual Private Network product family includes routers, firewalls, intrusion detection systems and VPN appliances. Progent's expert consulting staff includes field-proven specialists with Cisco CCIE and CCNP certifications who can assist your business to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that align best with your company goals. Read more information concerning Progent's Consulting Expertise for Cisco Security and Virtual Private Network Products.

Consulting Services for Additional Firewall and VPN Products
Progent offers small and medium size businesses expert consulting for Intrusion Protection products and IPsec VPN technology from major firewall and VPN security vendors including Check Point Software, Juniper, and SonicWALL. Progent can show you how to create a detailed security plan and select the right technologies from multiple suppliers to achieve your security objectives while staying within your budget limits.

Progent's Fixed-price Managed Services for Information Security
Progent offers a selection of low-cost, fixed-price monthly managed services intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services available from Progent include:
Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
Email Guard is Progent's email security platform that incorporates the services and infrastructure of leading data security companies to deliver centralized control and world-class protection for all your email traffic. The hybrid structure of Progent's Email Guard combines a Cloud Protection Layer with an on-premises security gateway appliance to provide complete protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne malware. The Cloud Protection Layer serves as a first line of defense and keeps the vast majority of threats from making it to your network firewall. This reduces your exposure to external threats and conserves system bandwidth and storage. Email Guard's on-premises security gateway appliance provides a deeper layer of inspection for incoming email. For outgoing email, the onsite gateway provides anti-virus and anti-spam filtering, protection against data leaks, and encryption. The on-premises gateway can also help Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends inside your corporate firewall. Find out more about Progent's Email Guard Spam Filtering, Virus Defense, Content Filtering and Data Leakage Prevention.

ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection service that utilizes next generation behavior-based machine learning tools to guard endpoints and physical and virtual servers against new malware attacks like ransomware and email phishing, which routinely get by legacy signature-matching anti-virus tools. ProSight Active Security Monitoring safeguards local and cloud-based resources and provides a unified platform to manage the complete threat progression including blocking, infiltration detection, containment, remediation, and post-attack forensics. Top capabilities include one-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) Next-Generation Endpoint Protection and Ransomware Defense.

ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent offer small and mid-sized organizations an affordable end-to-end solution for reliable backup/disaster recovery. Available at a fixed monthly price, ProSight DPS automates your backup activities and allows fast recovery of critical files, applications and VMs that have become lost or damaged as a result of hardware breakdowns, software bugs, natural disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to a local storage device, or mirrored to both. Progent's BDR specialists can deliver world-class support to configure ProSight Data Protection Services to be compliant with regulatory requirements like IPPA, FINRA, and PCI and, whenever needed, can help you to restore your business-critical data. Find out more about ProSight DPS Managed Backup.

Expert Network Security Design
Any company should develop a carefully considered security strategy that includes both preventive processes and response planning. The proactive plan is a collection of procedures designed to minimize security weaknesses. The post-attack strategy assists your IT security engineers to evaluate the damage caused by an attack, fix the system, document the event, and get the IT network operational as quickly as feasible.

Progent's expert IT security consultants can to help your company to run a complete risk assessment and create a computer security strategy to establish security policies and controls to reduce future assaults and threats.

CISM Accredited Security Consulting Assistance
The Certified Information Security Manager (CISM) committee defines the basic competencies and international standards of skill that IT security professionals are required to learn. CISM gives executive management the assurance that consultants who have earned their CISM certification have the experience and capability to provide efficient security management and consulting consulting. Progent can provide the expertise of CISM certified security professionals to assist businesses with:

  • Network Security Governance
  • Vulnerability Analysis
  • Information Security Program Management
  • Information Security Administration
  • Recovery Management
Find out additional details about Progent's CISM Accredited Information Security Engineering Services.

CISSP Qualified Security Engineering Expertise
The CISSP credential recognizes mastery of a worldwide standard for information security. The American National Standards Institute has granted the CISSP credential recognition in the area of data protection defined by ISO 17024. Progent can provide access to of security professionals who have qualified for CISSP accreditation. Progent can provide a CISSP-certified expert to help your organization in a broad range of security fields including:

  • Security Administration Procedures
  • Security Architecture and Models
  • Access Management Systems and Processes
  • Software Development Security
  • Operations Security
  • Physical Security
  • Data Encryption Technology
  • Telecommunications, Network and WAN Security
  • Business Continuity Preparedness
Learn additional details about Progent's CISSP Accredited Information Security Consulting Expertise.

ISSAP Accredited Secure IT Architecture Engineering Support
Progent's ISSAP certified network architecture professionals are experts who have earned ISSAP status through thorough testing and extensive work with information security architecture. The Information System Security Architecture Professional (ISSAP) credential represents proven competence in the more challenging requirements of IS security architecture within the wider scope of IS security knowledge needed for CISSP certification. Progent's ISSAP-qualified security experts can assist your business with all aspects of secure network architecture such as.

  • Access Management Mechanisms and Techniques
  • Phone System and Network Infrastructure Protection
  • Cryptography Options
  • Needs Evaluation and Security Guidelines
  • Business Continuity Planning (BCP) and Disaster Recovery Planning
  • Hardware Security
Learn more information about Progent's ISSAP Certified Secure Information System Architecture Support Services.

CISA Accredited Network Security Auditing Consulting Expertise
The Certified Information Systems Auditor accreditation is a prestigious qualification that indicates expertise in IS security audit and control. Accredited by ANSI, the CISA credential has candidates undergo a comprehensive examination administered by the ISACA international professional association. Progent's CISA-qualified security audit specialists can assist your business with:

  • Information Systems Audit Process
  • Information Technology Governance
  • Systems and Architecture Lifecycle
  • Information Technology Service Delivery
  • Protecting Information Assets
  • Business Continuity Preparedness
Find out additional details concerning Progent's CISA Qualified IS Security Auditing Engineering Services.

CRISC Consultants
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA to verify a consultant's skills to design, implement, and maintain IS control mechanisms to mitigate risk. Progent can provide the services of a CRISC-certified consultant to help you to develop and execute a workplace continuity strategy that follows industry best practices promoted by CRISC and geared to match your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC-certified network risk management engineers offer a variety of risk assessment services including:

  • Collect information and review documentation to evaluate major vulnerabilities
  • Identify statutory, regulatory, and business requirements and company standards associated with your information system to assess their potential influence on your strategic goals
  • Point out possible threats for your operational workflows to help in analyzing your corporate risk
  • Develop a risk awareness program and provide training to ensure your stakeholders understand IT risk so they can assist with your risk control program
  • Connect identified risk vectors to related business procedures to help assign risk responsibility
  • Validate risk appetite with your senior management and key stakeholders to make sure they align
Find out additional information concerning Progent's CRISC Experts.

GIAC Certified IS Security Consulting Expertise
GIAC (Global Information Assurance Certification) was established in 1999 to certify the skill of IT security engineers. GIAC's goal is to make sure that a certified security consultant possesses the skills needed to provide services in important areas of network, data, and application program security. GIAC accreditations are recognized by companies and institutions around the world including and the United States National Security Agency. Progent's GIAC security audit engineers can help your business in the areas of:

Find out additional details about Progent's GIAC Information Assurance Support.

Talk to a Security Engineer
To see how to get in touch with a certified security consultant for remote or onsite help in New Mexico, call 1-800-993-9400 or visit Remote Network Help.

© 2002- 2017 Progent Corporation. All rights reserved.