Business information networks in New Mexico can depend on quick and affordable remote technical support from Progent's qualified security professionals to assist with urgent security problems. Rates are affordable, billing is per minute, sign-up is quick, and service is world class. Progent also offers assistance for complex projects that requires the knowledge of senior security engineers with top industry certifications.

In case your New Mexico company is situated away from major metropolitan areas including Albuquerque, Las Cruces, Santa Fe, or Rio Rancho, support from nearby qualified network security experts may be limited when you have a security disaster. This could mean a drop in productivity for your business, angry clients, idle workers, and distracted executives. By calling Progent's online services, you can get in touch with a qualified security engineer ready to provide assistance when you require it to keep your system running and recover your information.

Progent can help you in your initiatives to guard your information system with services ranging from security assessments to creating a company-wide security plan. Progent provides economical service to assist small and midsize companies to design and maintain secure networks powered by Microsoft Windows and Cisco products and that can include computers based on UNIX or Linux platforms as well as BYOD users with Apple iOS handhelds or Android or Windows Phone devices.

Progent can also assist you to outsource spam filtering and protection from e-mail-based assaults. Email Guard is Progent's email security solution that incorporates the technology of leading data security vendors to provide centralized control and world-class security for all your email traffic. The hybrid structure of Progent's Email Guard integrates cloud-based filtering with a local security gateway device to offer complete protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based malware. The Cloud Protection Layer serves as a preliminary barricade and keeps the vast majority of threats from reaching your network firewall. This reduces your vulnerability to inbound threats and saves network bandwidth and storage space. ProSight Email Guard's on-premises security gateway device provides a further layer of analysis for inbound email. For outgoing email, the on-premises gateway offers AV and anti-spam protection, DLP, and encryption. The onsite security gateway can also enable Exchange Server to track and safeguard internal email traffic that stays within your corporate firewall.

Progent's certified professionals are accessible remotely or in person to offer a variety of emergency or project-based network security services including:

If your business has an emergency requirement for computer security support, refer to Progent's Urgent Remote Technical Help.

Progent's consultants provide advanced support in vital areas of network security that include security evaluation, firewalls and VPN, and high-level security planning.

System Security Evaluation
Progent's expert security consultants can assess the strength of your current network security environment by performing exhaustive remote automated analysis based on advanced software tools and tested techniques. Progent's skill in administering this testing saves you consulting fees and offers a detailed portrayal of system vulnerability. The information your company is provided can be used as the basis of a security strategy that will permit your network to operate dependably and respond quickly to future risks.

Automated Network Vulnerability Evaluation
Progent offers consulting in the application of security evaluation products such as MBSA and GFI LANguard Network Security Scanner for affordably performing a set of automatic network auditing scans to identify potential security problems. Progent has broad knowledge of additional security auditing tools including NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, plus tools such as SolarWinds, Netcat, Socat, and Nikto. Progent can help you to make sense of testing reports and respond effectively.

Progent can show you how to design security into your company processes, configure scanning tools, plan and deploy a protected system environment, and recommend procedures to maximize the safety of your network. Progent's security engineers are available to assist you to set up a firewall, implement safe remote access to email and data, and install virtual private network. Learn more concerning Progent's network security audits.

Security Inventory and Evaluation Bundles for Small Companies
Progent offers two low-cost security inventory and evaluation packages intended to enable small businesses to receive a professional security evaluation from a certified security consultant. With Progent's External Security Inventory Scan, an engineer administers a comprehensive test of your IT infrastructure from outside your firewall to uncover possible risks in the security posture you expose to the outside world. With Progent's Internal Security Inventory Checkup, a security engineer executes a system scan from an authorized machine inside your company firewall to assess vulnerabilities to internal assaults. The two security inventory services are set up and executed from a protected external location. The process is directed by an engineer with high-level security credentials and who produces a document that details and interprets the data captured by the security scan and proposes cost-effective remediation where called for.

Stealth Penetration Testing Support Services
Stealth intrusion testing is an important part of any successful IT system security plan. Progent’s security experts can perform extensive penetration checks without the awareness of your organization's internal network support resources. Unannounced penetration testing shows whether current security defense systems such as intrusion incident alerts and event history analysis are properly configured and actively monitored. Learn more concerning Progent's stealth security penetration analysis support services.

Firewall And Virtual Private Network (VPN) Solutions
Progent's background in security solutions includes in-depth field work with major firewalls and Virtual Private Network technology from a variety of vendors such as Cisco, Microsoft, and CheckPoint. Progent can provide the support of consultants who have earned important industry certifications including CCIE and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Integration and Troubleshooting
The latest generation of ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide substantially more value than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX firewalls for new installations. After Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system. Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network consultants can help you to manage your existing PIX or Cisco ASA 5500 firewalls or upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your company to design, integrate, optimize, manage and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Read additional information about ASA 5500-X Firewalls with Firepower Services configuration and troubleshooting support.

Cisco Security and Virtual Private Network Consulting Services
Cisco's network security and offsite access technology offer a comprehensive range of easy-to-administer security solutions to help safeguard your local and remote information system. Cisco's VPN product family includes routers, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's expert staff of consultants includes experienced engineers with Cisco Certified Internetwork Expert and CCNP certifications who are able to help your business to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that align most closely with your business objectives. Read more details concerning Progent's Engineering Expertise for Cisco Security Technology and VPN Appliances.

Consulting Services for Other Firewall and VPN Products
Progent provides small and mid-size companies expert consulting for Intrusion Protection products and IPsec VPN technology from major firewall and VPN security companies such as Check Point Software, Juniper, and SonicWALL. Progent can show you how to design a detailed security strategy and choose the right technologies from a variety of vendors to support your security goals while sticking within your spending restraints.

Progent's Fixed-price Managed Services for Information Security
Progent's value-priced ProSight series of network management outsourcing services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection service that incorporates cutting edge behavior-based machine learning tools to guard endpoints as well as servers and VMs against new malware attacks such as ransomware and file-less exploits, which easily get by legacy signature-matching AV tools. ProSight ASM protects local and cloud-based resources and offers a single platform to automate the complete malware attack progression including filtering, identification, containment, cleanup, and post-attack forensics. Top capabilities include single-click rollback with Windows VSS and real-time network-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
ProSight Enhanced Security Protection (ESP) services offer ultra-affordable in-depth protection for physical servers and virtual machines, desktops, smartphones, and Microsoft Exchange. ProSight ESP uses contextual security and modern behavior analysis for round-the-clock monitoring and responding to security assaults from all attack vectors. ProSight ESP delivers two-way firewall protection, penetration alarms, device management, and web filtering through leading-edge tools incorporated within one agent accessible from a single console. Progent's security and virtualization experts can assist you to design and implement a ProSight ESP deployment that meets your organization's specific needs and that helps you prove compliance with government and industry data protection regulations. Progent will assist you define and implement security policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alarms that call for urgent attention. Progent can also help your company to install and verify a backup and disaster recovery system like ProSight Data Protection Services so you can recover quickly from a destructive cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Exchange filtering.

ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services offer small and mid-sized businesses an affordable end-to-end solution for secure backup/disaster recovery (BDR). Available at a low monthly rate, ProSight DPS automates and monitors your backup activities and allows fast recovery of vital files, apps and VMs that have become lost or corrupted as a result of hardware breakdowns, software bugs, natural disasters, human error, or malware attacks such as ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, applications, system images, plus Hyper-V and VMware images. Critical data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's BDR specialists can provide advanced expertise to configure ProSight DPS to be compliant with government and industry regulatory standards such as HIPPA, FINRA, and PCI and, whenever needed, can assist you to recover your critical data. Read more about ProSight DPS Managed Backup and Recovery.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the infrastructure of leading data security companies to provide centralized management and comprehensive protection for all your inbound and outbound email. The powerful structure of Email Guard managed service combines cloud-based filtering with an on-premises gateway device to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne malware. Email Guard's Cloud Protection Layer serves as a preliminary barricade and blocks the vast majority of threats from reaching your network firewall. This decreases your vulnerability to external attacks and conserves system bandwidth and storage. Email Guard's onsite gateway device adds a further level of inspection for inbound email. For outbound email, the on-premises gateway provides AV and anti-spam filtering, DLP, and email encryption. The on-premises gateway can also assist Exchange Server to track and safeguard internal email traffic that originates and ends within your security perimeter. For more information, see Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and applications hosted in a secure fault tolerant data center on a fast virtual machine host configured and maintained by Progent's IT support professionals. Under the ProSight Virtual Hosting model, the customer retains ownership of the data, the OS software, and the apps. Because the environment is virtualized, it can be ported easily to an alternate hosting solution without a lengthy and difficult configuration process. With ProSight Virtual Hosting, you are not locked into one hosting service. Learn more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, update, retrieve and protect data about your IT infrastructure, processes, business apps, and services. You can instantly locate passwords or IP addresses and be alerted about upcoming expirations of SSL certificates or domains. By updating and organizing your IT documentation, you can eliminate up to 50% of time thrown away looking for vital information about your network. ProSight IT Asset Management features a centralized location for storing and collaborating on all documents related to managing your business network like standard operating procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for collecting and associating IT information. Whether you’re planning enhancements, performing maintenance, or responding to an emergency, ProSight IT Asset Management delivers the information you require the instant you need it. Learn more about Progent's ProSight IT Asset Management service.

Certified Network Security Planning
Any business ought to have a thoroughly thought out security program that incorporates both proactive procedures and reaction plans. The proactive plan is a collection of procedures intended to reduce security weaknesses. The post-attack strategy helps your company's IT security engineers to evaluate the impact resulting from an attack, fix the system, record the event, and get the IT network restored as quickly as possible.

Progent's certified IT security consultants can to assist your company to perform a full risk assessment and create a network security strategy to implement security policies and mechanisms to minimize future attacks and threats.

CISM Accredited Security Consulting Services
The CISM committee defines the core capabilities and international standards of skill that IT security professionals are expected to learn. It gives executive management the assurance that consultants who have qualified for their CISM credential possess the background and capability to provide efficient security administration and consulting consulting. Progent can provide the services of CISM qualified security consultants to help businesses with:

  • Information Security Processes
  • Risk Management
  • Network Security Implementation Management
  • IS Security Administration
  • Response Management
Read additional information concerning Progent's CISM Certified IS Security Engineering Expertise.

CISSP Certified Security Engineering Expertise
The CISSP credential denotes mastery of a global standard for data security. The American National Standards Institute has awarded certification recognition in the area of information protection stipulated by ISO/IEC 17024. Progent can provide access to of security professionals who have earned CISSP certification. Progent can give you access to a CISSP-certified professional to help your business in a variety security areas including:

  • Security Administration Practices
  • Security Infrastructure and Paradigms
  • Access Control Solutions and Methodology
  • Software Development Security
  • Operations Security
  • Site Security
  • Cryptography Mechanisms
  • Telecommunications, LAN and WAN Security
  • Disaster Recovery Planning
Learn additional details concerning Progent's CISSP Security Engineering Services.

ISSAP Accredited Secure Information System Architecture Consulting Expertise
Progent's ISSAP certified IT architecture professionals are consultants who have earned ISSAP Certification as a result of rigorous examination and significant experience with information security architecture. The ISSAP credential represents demonstrated competence in the more challenging demands of IS security architecture within the broader scope of IS security knowledge required for CISSP accreditation. Progent's ISSAP-certified security specialists can help your company with all aspects of secure network architecture such as.

  • Access Management Systems and Techniques
  • Telecom and System Infrastructure Security
  • Encryption/Decryption Options
  • Requirements Evaluation and Security Criteria
  • BCP and Disaster Recovery Planning
  • Hardware Security
Find out more details about Progent's ISSAP Accredited Secure Information System Architecture Support Professionals.

CISA Certified IS Security Auditing Consulting Services
The CISA credential is an important achievement that represents mastery in information system security audit and control. Accredited by the American National Standards Institute, the CISA accreditation has consultants pass an extensive test administered by the ISACA professional group. Progent's CISA-qualified network security audit specialists can assist your business in the areas of:

  • IS Audit Services
  • IT Administration
  • Network Assets and Architecture Lifecycle Planning
  • Information Technology Support
  • Protecting Information Resources
  • Business Continuity Preparedness
Learn more details about Progent's CISA Accredited IS Security Auditing Engineering Expertise.

CRISC Experts
The CRISC program was initiated by ISACA to validate a consultant's skills to design, implement, and support information system control mechanisms to reduce network risk. Progent offers the services of a CRISC-certified consultant to assist your company to develop and carry out a workplace continuity strategy based on industry best practices identified by CRISC and crafted to match your company's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC-certified IT risk mitigation consultants can provide a range of risk evaluation services such as:

  • Collect data and study documentation to identify significant risk scenarios
  • Inventory legal, industry, and contractual requirements and organizational standards associated with your network to determine their possible impact on your business objectives
  • Identify possible vulnerabilities for your business processes to assist in analyzing your corporate risk
  • Develop a risk awareness initiative and conduct training to ensure your stakeholders appreciate information system risk so they can assist with your risk control process
  • Match key risk vectors to related business procedures to help assign risk ownership
  • Determine risk tolerance with executive management and key stakeholders to make sure they match
Get additional details about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Certified IS Security Engineering Support
GIAC was founded in 1999 to validate the knowledge of IT security engineers. GIAC's mission is to assure that an accredited security consultant possesses the skills appropriate to provide support in vital areas of network, information, and software security. GIAC certifications are recognized by businesses and institutions throughout the world including and the United States NSA. Progent's GIAC information security audit consultants can help your company with:

Learn more details concerning Progent's GIAC Information Assurance Services.

Contact a Certified Progent Security Specialist
To learn how you can get in touch with a security engineer for remote or on-premises expertise in New Mexico, phone 1-800-993-9400 or visit Online Network Help.














© 2002- 2018 Progent Corporation. All rights reserved.