Small business IT networks in New Mexico can have fast and economical online technical support from Progent's qualified network security experts to fix critical security problems. The cost is competitive, billing is per minute, engagement is quick, and service is unbeatable. Progent also provides help for complex projects that requires the knowledge of seasoned security engineers with high-level security credentials.

If your New Mexico business is based far from larger metropolitan areas like Albuquerque, Las Cruces, Santa Fe, or Rio Rancho, contact with local qualified security consultants may be problematic when there's a crisis. This can result in a drop in revenue for your company, angry customers, unproductive workers, and defocused executives. By contacting Progent, you have access to a certified security engineer who can provide help when you have to have it to keep your system on line and salvage your information.

Progent can help you in all your efforts to guard your network with services that ranges from network security assessments to creating a comprehensive security strategy. Progent provides economical support to help small and midsize companies to set up and maintain safe networks based on Microsoft Windows and Cisco technology and that can include computers based on UNIX or Linux operating systems plus mobile users with Apple iOS handhelds or Google Android or Windows Phone handsets.

Progent can also help you outsource spam filtering and protection from email-borne assaults. Email Guard is Progent's email filtering and encryption platform that incorporates the technology of top information security companies to deliver centralized control and world-class security for your inbound and outbound email. The hybrid architecture of Email Guard combines a Cloud Protection Layer with a local security gateway device to provide advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based malware. ProSight Email Guard's cloud filter serves as a first line of defense and blocks most threats from making it to your security perimeter. This decreases your exposure to inbound attacks and conserves system bandwidth and storage space. ProSight Email Guard's on-premises security gateway appliance adds a further level of inspection for incoming email. For outgoing email, the on-premises security gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and encryption. The on-premises security gateway can also enable Microsoft Exchange Server to monitor and protect internal email traffic that stays inside your corporate firewall.

Progent's certified professionals are available remotely or in person to provide a range of urgent or longer-term IT security services such as:

  • Run automated security evaluations
  • Recuperate promptly after attacks
  • Configure firewalls from multiple vendors
  • Implement secure solutions for offsite and mobile connectivity
  • Install effective software for protection against spam and directory harvest attacks
  • Develop a company-wide security plan with proactive monitoring
  • Provide comprehensive Call Center Services
  • Help Create an effective backup and business continuity solution based on Microsoft Data Protection Manager backup/restore technology
If your company has an urgent requirement for computer security help, go to Progent's Urgent Online Technical Support.

Progent's consultants offer world-class services in key fields of network security including security assessment, firewall and VPN solutions, and advanced security consulting.

System Security Evaluation
Progent's expert security engineers can evaluate the strength of your current network protection systems through exhaustive remote automated testing via advanced utilities and tested techniques. Progent's skill in administering this testing saves you consulting fees and offers an accurate portrayal of system vulnerability. The knowledge your company gains can make up the foundation of a network protection strategy that will allow your information system to run safely and react rapidly to new risks.

Automated Vulnerability Evaluation
Progent provides expertise in the use of security evaluation packages such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard NSS for affordably running a variety of programmed system auditing scans to identify possible security gaps. Progent has extensive experience with additional security auditing utilities such as NMAP Port Scanner, AMAP Application Scanner, eEye Vulnerability Scanner, plus utilities like Metasploit Framework, Netcat, Socat, and Nikto. Progent can help you to make sense of testing reports and react appropriately.

Progent can help you build protection into your business processes, install scanning tools, define and deploy a secure network environment, and recommend procedures to optimize the safety of your network. Progent's security consultants are ready to assist you to set up a firewall, design secure remote access to email and data, and integrate VPN. Learn more about Progent's network security audits.

Security Inventory and Evaluation Bundles for Small Businesses
Progent offers two ultra-affordable security inventory and evaluation packages designed to allow small businesses to get an independent security assessment from a certified security expert. With Progent's External Network Security Inventory Scan, a security engineer administers a comprehensive test of your IT infrastructure from beyond your firewall to uncover potential risks in the security posture you present to the public. With Progent's Internal Network Security Inventory Scan, an engineer executes a system scan from an authorized machine inside your firewall to evaluate vulnerabilities to internal attacks. Both security inventory packages are configured and run from a secured external site. The process is overseen by a consultant who has earned high-level security accreditations and who produces a document that summarizes and interprets the information captured by the security scan and proposes practical improvements if appropriate.

Stealth Intrusion Analysis Consulting
Stealth penetration checking is an important component of any serious network security plan. Progent’s security experts can perform extensive penetration tests without the awareness of your organization's internal network support resources. Stealth penetration testing shows whether existing security monitoring systems such as intrusion detection alerts and event history monitoring are correctly configured and consistently checked. Learn more concerning Progent's network penetration testing consulting.

Firewalls and VPN Expertise
Progent's expertise in network security solutions includes in-depth field work with leading firewalls and VPN products offered by a variety of companies such as Cisco, Microsoft, and Juniper. Progent can provide the support of consultants with important networking certifications including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Integration and Debugging
The current ASA 5500-X Family of firewalls with Firepower Services provide substantially more performance than Cisco's previous firewalls and have replaced the ASA 5500 and PIX 500 security appliances for all new deployments. Since Cisco's acquisition of Sourcefire, the whole line of Cisco ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort product, which is the market's most popular network intrusion protection system. Firepower services provide powerful new features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist your company to manage your current PIX or Cisco ASA 5500 security appliances or upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can help you to plan, configure, optimize, administer and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Find out more information about ASA Firewalls with Firepower Services configuration and debugging services.

Cisco Security and VPN Support Expertise
Cisco's network security and offsite connection products provide a comprehensive range of manageable security solutions to help protect your wired and wireless information system. Cisco's Virtual Private Network product family includes routers, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's professional consulting staff includes field-proven engineers with Cisco's CCIE and CCNP certifications who can assist your organization to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that fit most closely with your company goals. Read additional details about Progent's Engineering Services for Cisco Security Technology and VPN Appliances.

Consulting Services for Additional Firewall and Virtual Private Network Technology
Progent provides small and medium size businesses professional support for Intrusion Protection products and IPsec VPN products from leading firewall and Virtual Private Network security companies such as WatchGuard, Juniper Networks, and Symantec. Progent can show you how to design a comprehensive security strategy and choose appropriate technologies from multiple suppliers to support your security objectives while staying within your budget limits.

Progent's Flat-rate Managed Services for Information Assurance
Progent's value-priced ProSight line of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. Managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that utilizes cutting edge behavior analysis technology to defend endpoints as well as servers and VMs against modern malware attacks such as ransomware and file-less exploits, which easily escape legacy signature-based anti-virus products. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and offers a single platform to address the complete threat lifecycle including protection, infiltration detection, mitigation, cleanup, and forensics. Key capabilities include single-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against newly discovered attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) services deliver economical multi-layer security for physical and virtual servers, desktops, mobile devices, and Microsoft Exchange. ProSight ESP utilizes contextual security and modern behavior analysis for continuously monitoring and reacting to cyber assaults from all vectors. ProSight ESP provides two-way firewall protection, intrusion alarms, device control, and web filtering via leading-edge technologies packaged within one agent accessible from a unified console. Progent's data protection and virtualization experts can help your business to plan and implement a ProSight ESP environment that meets your company's specific needs and that helps you demonstrate compliance with legal and industry information protection regulations. Progent will help you specify and configure policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alerts that require urgent attention. Progent's consultants can also help your company to set up and verify a backup and disaster recovery solution such as ProSight Data Protection Services so you can get back in business quickly from a destructive cyber attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Microsoft Exchange filtering.

ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services offer small and medium-sized businesses an affordable and fully managed solution for secure backup/disaster recovery (BDR). Available at a low monthly rate, ProSight Data Protection Services automates and monitors your backup activities and enables rapid recovery of vital data, apps and VMs that have become unavailable or corrupted due to hardware breakdowns, software bugs, natural disasters, human error, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to an on-promises storage device, or to both. Progent's BDR consultants can provide advanced support to configure ProSight Data Protection Services to be compliant with regulatory requirements like HIPPA, FINRA, and PCI and, whenever necessary, can assist you to restore your business-critical data. Learn more about ProSight DPS Managed Backup and Recovery.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the technology of leading information security vendors to provide web-based control and comprehensive protection for all your email traffic. The hybrid structure of Progent's Email Guard managed service combines cloud-based filtering with an on-premises security gateway device to provide advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. Email Guard's cloud filter acts as a first line of defense and keeps most unwanted email from reaching your network firewall. This reduces your vulnerability to inbound threats and saves system bandwidth and storage space. Email Guard's onsite security gateway device adds a deeper layer of analysis for incoming email. For outbound email, the onsite gateway provides anti-virus and anti-spam protection, protection against data leaks, and email encryption. The onsite gateway can also assist Exchange Server to monitor and protect internal email traffic that stays inside your security perimeter. For more information, see Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small business can have its critical servers and applications hosted in a secure fault tolerant data center on a fast virtual host set up and managed by Progent's network support professionals. Under Progent's ProSight Virtual Hosting model, the customer owns the data, the operating system software, and the applications. Since the system is virtualized, it can be moved immediately to a different hosting environment without a lengthy and technically risky reinstallation process. With ProSight Virtual Hosting, your business is not tied a single hosting service. Find out more about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, maintain, retrieve and safeguard data about your IT infrastructure, processes, applications, and services. You can quickly locate passwords or IP addresses and be alerted about impending expirations of SSLs ,domains or warranties. By updating and organizing your IT infrastructure documentation, you can eliminate up to 50% of time thrown away trying to find vital information about your IT network. ProSight IT Asset Management features a common location for storing and sharing all documents related to managing your business network such as standard operating procedures and How-To's. ProSight IT Asset Management also offers a high level of automation for collecting and relating IT information. Whether you’re planning enhancements, performing regular maintenance, or responding to an emergency, ProSight IT Asset Management gets you the data you need the instant you need it. Learn more about ProSight IT Asset Management service.

Certified Security Design
Any business should develop a carefully thought out security program that includes both pre-attack procedures and reaction plans. The pre-attack strategy is a set of mechanisms that help to reduce security weaknesses. The reactive strategy assists your company's security engineers to evaluate the damage resulting from a security penetration, repair the network, document the event, and get the IT network operational as quickly as feasible.

Progent's certified IS security engineers can to assist your business to perform a full vulnerability evaluation and define a company-wide security plan to establish security policies and mechanisms to reduce future attacks and dangers.

CISM Certified Security Consulting Expertise
The Certified Information Security Manager (CISM) committee defines the basic capabilities and worldwide standards of performance that information security professionals are expected to master. It provides business management the assurance that those who have qualified for their CISM credential possess the background and capability to provide efficient security management and consulting consulting. Progent can provide the services of CISM certified security professionals to assist businesses with:

  • Network Security Strategies
  • Vulnerability Analysis
  • Network Security Program Management
  • IS Security Administration
  • Recovery Management
Read additional details concerning Progent's CISM Certified Information Security Engineering Professionals.

CISSP Certified Security Engineering Expertise
CISSP denotes mastery of a worldwide standard for information security. ANSI (American National Standards Institute) has granted certification accreditation in the area of data protection stipulated by ISO/IEC 17024. Progent can provide access to of security consultants who have earned CISSP certification. Progent can give you access to a CISSP-certified professional to help your business in a broad range of security fields including:

  • Security Administration Practices
  • Security Architecture and Paradigms
  • Access Control Solutions and Methodology
  • Software Development Security
  • Operations Security
  • Physical Security
  • Data Encryption Mechanisms
  • Telecommunications, Network and Internet Security
  • Disaster Recovery Planning
Learn more information about Progent's CISSP-certified Information Security Consulting Expertise.

CISSP-ISSAP Certified Secure System Architecture Consulting Expertise
Progent's CISSP-ISSAP qualified information system architecture professionals are experts who have been awarded ISSAP Certification as a result of thorough testing and significant work with information security design. The Information System Security Architecture Professional (ISSAP) credential represents demonstrated competence in the more complex requirements of IS security architecture bounded by the wider field of information security expertise required for CISSP certification. Progent's ISSAP-qualified security specialists can help your business with all phases of architecture security including.

  • Access Control Systems and Methodologies
  • Phone System and Network Infrastructure Security
  • Data Encryption Options
  • Needs Evaluation and Security Criteria
  • BCP and Disaster Recovery Planning (DRP)
  • Hardware Security
Learn additional details concerning Progent's ISSAP Certified Secure System Architecture Engineering Expertise.

CISA Certified IS Security Auditing Consulting Services
The CISA credential is a globally recognized achievement that represents mastery in IS security auditing. Accredited by the American National Standards Institute (ANSI), the CISA credential has consultants undergo an extensive examination given by the ISACA international professional group. Progent's CISA-certified IS security audit engineers can help your IT organization with:

  • IS Audit Services
  • Information Technology Administration
  • Network Assets and Architecture Planned Useful Life
  • Information Technology Service Delivery
  • Safeguarding Information Resources
  • Disaster Recovery Planning
Learn more details about Progent's CISA Qualified Information System Security Auditing Engineering Support.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC certification program was initiated by ISACA to validate a consultant's skills to plan, implement, and support IS control mechanisms to mitigate network risk. Progent can provide the services of a CRISC-certified consultant to help you to create and carry out a workplace continuity or disaster recovery strategy based on leading practices promoted by CRISC and crafted to match your organization's risk appetite, business goals, and budgetary guidelines. Progent's CRISC-qualified IT risk management specialists offer a variety of risk evaluation services including:

  • Collect data and review documentation to identify major risk scenarios
  • Identify legal, regulatory, and contractual mandates and organizational policies related to your information system to assess their possible influence on your business goals
  • Point out potential vulnerabilities for your operational workflows to help in evaluating your corporate risk
  • Create a risk awareness initiative and conduct training to make sure your organization understand information system risk so they can contribute to your risk management process
  • Connect key risk scenarios to your associated operational processes to help assign risk responsibility
  • Validate risk tolerance with your senior management and major stakeholders to make sure they are in agreement
Get the details concerning Progent's CRISC Risk Management Experts.

GIAC Certified IS Security Consulting Support
GIAC was founded in 1999 to certify the skill of information technology security experts. GIAC's goal is to assure that an accredited professional possesses the skills appropriate to provide services in important areas of system, data, and software security. GIAC certifications are acknowledged by companies and institutions throughout the world including and the United States National Security Agency. Progent's GIAC-certified network security audit experts can assist your IT organization in the areas of:

  • Assessing IT Infrastructure
  • Security Incident Handling
  • Intrusion Detection
  • Web-based Services Security
  • SIEM solutions
Find out additional information concerning Progent's GIAC Information Assurance Services.

Contact a Certified Security Engineer
To learn how you can get in touch with a Progent security engineer for remote or on-premises expertise in New Mexico, phone 1-800-993-9400 or visit Remote Network Help.

© 2002- 2019 Progent Corporation. All rights reserved.