Business networks in Oklahoma can depend on prompt and affordable online technical support from Progent's accredited security consultants to fix critical security issues. Rates are affordable, billing is per minute, engagement is quick, and service is unbeatable. Progent also offers help for long-term projects that requires the services of senior security consultants with high-level industry certifications.

If your Oklahoma business is situated far from larger metropolitan areas such as Oklahoma City, Tulsa, Norman, or Lawton, support from local certified security support specialists may be problematic when you have an urgent situation. This could mean lost revenue for your company, upset clients, unproductive workers, and defocused executives. By utilizing Progent's online services, you can get in touch with a certified security engineer ready to provide assistance when you require it to keep your network on line and recover your data.

Progent can assist you in your initiatives to defend your network with support that can range from security audits to creating a company-wide security plan. Progent provides economical support to help small and midsize companies to design and manage secure IT environments based on Windows and Cisco products and that can include servers and desktops running UNIX or Linux platforms as well as mobile clients with Apple iOS handhelds or Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam filtering and defense against email-borne security threats. Email Guard is Progent's email filtering and encryption solution that uses the technology of leading data security vendors to provide web-based control and comprehensive security for your inbound and outbound email. The hybrid structure of Progent's Email Guard combines cloud-based filtering with a local security gateway device to offer complete protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based threats. ProSight Email Guard's Cloud Protection Layer acts as a preliminary barricade and keeps the vast majority of threats from making it to your security perimeter. This decreases your exposure to external threats and saves network bandwidth and storage space. ProSight Email Guard's on-premises gateway device adds a deeper level of analysis for inbound email. For outgoing email, the onsite gateway provides AV and anti-spam protection, DLP, and encryption. The on-premises security gateway can also help Microsoft Exchange Server to monitor and protect internal email traffic that stays inside your security perimeter.

Progent's security consultants are available online or in person to provide a variety of urgent or longer-term network security services including:

  • Perform extensive security audits
  • Recover rapidly after attacks
  • Install and troubleshoot firewalls
  • Configure safe solutions for offsite and mobile connectivity
  • Deploy advanced utilities for automatic protection against viruses, spam and directory harvest attacks
  • Help create a company-wide security strategy with proactive monitoring
  • Offer outsourced Call Center Support
  • Help Develop an effective network backup and recovery strategy centered on Microsoft Data Protection Manager automated backup technology
If your business has an urgent requirement for computer security support, go to Progent's Emergency Online Network Help.

Progent's security experts provide world-class support in vital fields of network security that include analysis, firewalls and VPN, and advanced security planning.

System Audits
Progent's expert security consultants can evaluate the vulnerability of your existing computer security systems through exhaustive remote automated analysis via sophisticated utilities and proven procedures. Progent's experience in this service saves you time and money and offers an accurate picture of gaps. The knowledge your IT organization gains can form the basis of a network protection plan that can permit your information system to operate dependably and respond rapidly to new risks.

Automated Network Security Evaluation
Progent offers consulting in the application of security evaluation packages including Microsoft's MBSA and LANguard from GFI for affordably performing a set of programmed network auditing checks to uncover possible security problems. Progent has broad knowledge of other network auditing products such as NMAP, AMAP application mapper, eEye Vulnerability Scanner, plus tools like SolarWinds, Hydra, and Nikto. Progent can show you how to understand audit reports and respond appropriately.

Progent can help you design security into your business processes, configure scanning applications, plan and deploy a protected system environment, and recommend procedures to optimize the safety of your IT system. Progent's security professionals are available to assist you to configure a firewall, implement secure remote connectivity to email and business applications, and install virtual private network. Learn more concerning Progent's automated security analysis.

Security Inventory Packages for Small Businesses
Progent has put together two low-cost security inventory service bundles intended to enable small companies to receive a professional security assessment from a qualified security specialist. With Progent's External Security Inventory Checkup, a security engineer administers a comprehensive test of your network from outside your firewall to uncover possible weaknesses in the security posture you expose to the public. With Progent's Internal Security Inventory Scan, an engineer executes a system scan from a secure machine inside your firewall to assess your exposure to inside attacks. Both security inventory services are set up and executed from a secured external site. The project is overseen by an engineer with top security credentials and who produces a document that details and analyzes the data collected by the scan and proposes practical remediation where appropriate.

Stealth Penetration Analysis Consulting
Stealth intrusion testing is an important part of any comprehensive network security plan. Progentís security professionals can run thorough intrusion checks without the knowledge of your organization's internal network support resources. Unannounced penetration checking shows whether existing security monitoring systems such as intrusion detection alerts and event log analysis are properly set up and consistently monitored. Learn more on Progent's stealth penetration testing consulting.

Firewall/VPN Solutions
Progent's background in network security technology includes in-depth familiarity with major firewalls and Virtual Private Network technology from a variety of vendors including Cisco, Microsoft, and Juniper. Progent can provide the support of engineers who have earned key networking accreditations including CCIE and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Configuration and Debugging
The current Cisco ASA 5500-X Family of firewalls with Firepower Services provide substantially more performance than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX firewalls for all new deployments. Since Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed network intrusion protection system (IPS). Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can assist you to manage your existing PIX or Cisco ASA 5500 security appliances and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite help with ASA 5500-X firewalls with Firepower Services and can help you to design, integrate, optimize, administer and troubleshoot firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. See additional information about Cisco ASA Firewalls with Firepower integration and debugging services.

Cisco Security and VPN Engineering Services
Cisco's network security and remote access technology represent a complete line of manageable security solutions to help protect your local and remote information system. Cisco's Virtual Private Network product family includes switches, firewalls, intrusion detection devices and VPN appliances. Progent's professional consulting staff includes field-proven engineers with Cisco's CCIE and Cisco Certified Network Professional qualifications who can help your company to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that fit most closely with your business goals. Find out more details about Progent's Consulting Services for Cisco Security and VPN Appliances.

Consulting Services for Additional Firewall and VPN Products
Progent provides small and mid-size businesses professional consulting for Intrusion Protection products and IPsec VPN solutions from major firewall and VPN security companies including WatchGuard, Juniper, and Symantec. Progent can show you how to design a comprehensive security strategy and select appropriate products from multiple vendors to achieve your security goals while staying within your spending restraints.

Progent's Fixed-price Managed Services for Information Security
Progent's affordable ProSight series of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services available from Progent include:
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the infrastructure of top data security companies to provide web-based management and world-class security for all your email traffic. The powerful structure of Email Guard managed service integrates a Cloud Protection Layer with a local security gateway device to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based threats. Email Guard's Cloud Protection Layer acts as a preliminary barricade and blocks the vast majority of unwanted email from making it to your security perimeter. This reduces your exposure to inbound attacks and conserves network bandwidth and storage. Email Guard's onsite gateway device provides a further level of inspection for inbound email. For outgoing email, the on-premises gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also help Microsoft Exchange Server to track and safeguard internal email traffic that stays within your corporate firewall. For more information, see ProSight Email Guard spam filtering and data leakage protection.

ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) solution that incorporates next generation behavior-based analysis tools to guard endpoint devices as well as servers and VMs against modern malware attacks such as ransomware and email phishing, which easily escape legacy signature-matching anti-virus products. ProSight ASM protects on-premises and cloud resources and provides a unified platform to manage the complete threat progression including blocking, detection, mitigation, remediation, and forensics. Key capabilities include single-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against newly discovered attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.

ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services offer small and mid-sized businesses a low cost end-to-end service for secure backup/disaster recovery (BDR). Available at a fixed monthly price, ProSight DPS automates your backup activities and enables rapid restoration of critical files, applications and virtual machines that have become unavailable or corrupted as a result of hardware failures, software glitches, disasters, human error, or malware attacks like ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware images. Critical data can be protected on the cloud, to an on-promises device, or to both. Progent's backup and recovery consultants can deliver advanced support to configure ProSight DPS to be compliant with regulatory requirements such as HIPPA, FINRA, and PCI and, whenever needed, can assist you to recover your critical information. Find out more about ProSight Data Protection Services Managed Backup.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, update, find and protect data related to your IT infrastructure, processes, business apps, and services. You can quickly find passwords or serial numbers and be warned about impending expirations of SSL certificates or domains. By updating and organizing your IT infrastructure documentation, you can save up to 50% of time thrown away trying to find critical information about your IT network. ProSight IT Asset Management includes a centralized repository for holding and collaborating on all documents related to managing your network infrastructure such as standard operating procedures and How-To's. ProSight IT Asset Management also supports advanced automation for collecting and associating IT data. Whether youíre planning improvements, performing regular maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the knowledge you need when you need it. Find out more details about ProSight IT Asset Management service.

Certified Network Security Design
Every business should develop a carefully considered security program that incorporates both proactive procedures and response plans. The proactive strategy is a collection of mechanisms that help to reduce security weaknesses. The post-attack strategy helps your company's IT security engineers to assess the damage caused by an attack, repair the network, record the event, and get business functions running as soon as feasible.

Progent's expert IS security consultants are available to assist you to perform a complete risk assessment and create a company-wide security strategy to establish security processes and controls to mitigate future assaults and dangers.

CISM Accredited Network Security Support Services
The CISM organization defines the core capabilities and worldwide standards of performance that IT security managers are expected to learn. It gives executive management the assurance that those who have earned their CISM certification possess the experience and capability to deliver efficient security administration and consulting consulting. Progent can provide the expertise of CISM certified security professionals to assist businesses with:

  • Network Security Governance
  • Vulnerability Analysis
  • Information Security Program Management
  • IS Security Administration
  • Response Management
Read more information about Progent's CISM Qualified Information Security Consulting Professionals.

CISSP Certified Security Engineering Expertise
CISSP denotes mastery of a worldwide standard for data security. ANSI (American National Standards Institute) has awarded the CISSP credential accreditation in the field of data security defined by ISO/IEC 17024. Progent can provide access to of security experts who have earned CISSP certification. Progent can provide a CISSP-certified consultant to help your organization in a variety security fields including:

  • Security Administration Procedures
  • Security Architecture and Paradigms
  • Access Control Solutions and Processes
  • Software Development Security
  • Secure Operations
  • Physical Security
  • Cryptography Mechanisms
  • Telecom, Network and WAN Security
  • Disaster Recovery Planning
Learn more information concerning Progent's CISSP Accredited Information Security Engineering Professionals.

ISSAP Certified Secure IT Architecture Engineering Assistance
Progent's ISSAP certified network architecture engineers are experts who have earned ISSAP Certification through thorough testing and extensive experience with information security design. The Information System Security Architecture Professional (ISSAP) credential represents proven competence in the more complex demands of information security architecture bounded by the broader field of information system security knowledge needed for CISSP certification. Progent's ISSAP-certified security experts can help your business with all phases of architecture security including.

  • Access Control Mechanisms and Techniques
  • Phone System and System Infrastructure Security
  • Encryption/Decryption Options
  • Needs Analysis and Security Standards
  • Business Continuity Planning (BCP) and Disaster Recovery Planning
  • Site Security
Read additional details about Progent's ISSAP Accredited Secure Network Architecture Consulting Expertise.

CISA Certified Security Auditing Engineering Expertise
The CISA credential is a recognized qualification that indicates mastery in IS security auditing. Accredited by the American National Standards Institute (ANSI), the CISA accreditation has consultants pass a comprehensive examination given by the ISACA professional group. Progent's CISA security audit experts are available to assist your business in the areas of:

  • IS Audit Services
  • IT Governance
  • Network Assets and Infrastructure Planned Useful Life
  • IT Service Delivery
  • Safeguarding Data Assets
  • Business Continuity Preparedness
Learn more information about Progent's CISA Accredited IS Security Auditing Engineering Assistance.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC certification program was established by ISACA to verify an IT professional's skills to design, deploy, and maintain information system control mechanisms to mitigate network risk. Progent offers the services of a CRISC-certified consultant to assist your company to develop and carry out a workplace continuity or disaster recovery strategy based on leading practices promoted by CRISC and geared to align with your company's risk appetite, business goals, and IT budget. Progent's CRISC-qualified IT risk mitigation specialists offer a variety of risk evaluation services such as:

  • Collect information and study documentation to help identify significant risk scenarios
  • Identify statutory, industry, and business requirements and company policies related to your network to assess their potential influence on your business goals
  • Identify potential threats for your business processes to assist in analyzing your enterprise risk
  • Develop a risk awareness initiative and provide seminars to ensure your stakeholders understand IT risk so they can assist with your risk control program
  • Match identified risk vectors to related operational processes to help assign risk ownership
  • Determine risk tolerance with your senior leadership and key stakeholders to make sure they match
Find out additional information about Progent's CRISC Experts.

GIAC Qualified Information System Security Engineering Services
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the skill of computer security professionals. GIAC's goal is to assure that a certified professional possesses the skills needed to provide services in important categories of network, information, and software security. GIAC accreditations are recognized by companies and institutions around the world including and the United States National Security Agency (NSA). Progent's GIAC-qualified network security audit experts can assist your IT organization in the areas of:

  • Assessing Security Systems
  • Security Incident Handling
  • Intrusion Detection
  • Web Application Security
  • SIEM solutions
Learn more details about Progent's GIAC Information Assurance Expertise.

Contact a Certified Progent Security Expert
To find out how to access a security consultant for remote or onsite help in Oklahoma, call 1-800-993-9400 or visit Remote Network Support.

© 2002- 2018 Progent Corporation. All rights reserved.