Small business information networks in Oklahoma can have fast and economical online help from Progent's qualified security professionals to fix urgent security issues. The cost is reasonable, charges are per minute, sign-up is immediate, and service is world class. Progent also provides assistance for long-term engagements that requires the knowledge of seasoned security consultants with high-level security credentials.

If your Oklahoma organization is some distance from major urban neighborhoods such as Oklahoma City, Tulsa, Norman, or Lawton, support from nearby certified network security consultants is often limited when you have a security disaster. This can cause a drop in income for your company, angry customers, unproductive employees, and defocused management. By utilizing Progent's remote support, you can get in touch with a qualified security engineer who can offer assistance whenever you need it to get your network operating and restore your data.

Progent can assist you at any level in your initiatives to protect your network with services that ranges from network security checks to developing a company-wide security plan. Progent provides economical service to assist companies of any size to configure and maintain safe networks powered by Windows and Cisco products and that may include servers and desktops running UNIX or Linux platforms plus mobile clients with Apple iOS iPhones and iPads or Google Android or Windows Phone handsets.

Progent can also assist you to outsource spam blocking and defense against e-mail-based assaults. Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of top data security vendors to provide centralized management and comprehensive security for your email traffic. The powerful structure of Email Guard managed service combines a Cloud Protection Layer with a local security gateway appliance to offer advanced protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-based threats. ProSight Email Guard's cloud filter serves as a preliminary barricade and keeps the vast majority of unwanted email from reaching your security perimeter. This reduces your vulnerability to inbound attacks and saves system bandwidth and storage. ProSight Email Guard's onsite gateway device provides a further level of analysis for incoming email. For outgoing email, the on-premises gateway offers AV and anti-spam filtering, DLP, and email encryption. The local gateway can also help Exchange Server to track and safeguard internal email traffic that stays inside your security perimeter.

Progent's certified engineers are available remotely or on site to offer a variety of urgent or longer-term computer security services such as:

  • Run comprehensive network security audits
  • Recuperate promptly after serious security breaches
  • Set up and troubleshoot firewalls
  • Implement safe solutions for remote and mobile connectivity
  • Install effective applications for defense against spam and DHAs
  • Help create a company-wide security plan with 24x7 security monitoring
  • Offer outsourced Help Desk Call Center Services
  • Help Create an effective backup and recovery solution centered on Microsoft DPM backup/restore capability
If your company has an urgent need for IT security help, go to Progent's Emergency Remote Network Help.

Progent's consultants offer world-class support in vital areas of network protection including auditing, firewall/VPN support, and advanced security consulting.

Security Assessment
Progent's certified security engineers can evaluate the vulnerability of your existing network security environment through exhaustive remote automated testing based on advanced software tools and proven procedures. Progent's experience in this testing saves you time and money and offers an objective picture of security holes. The knowledge your company is provided can be used as the basis of a security plan that can permit your network to run safely and respond quickly to new risks.

Automated Network Vulnerability Evaluation
Progent offers expertise in the application of security analysis packages including Microsoft Baseline Security Analyzer and LANguard from GFI for affordably performing a variety of programmed network auditing scans to uncover possible security weaknesses. Progent has broad experience with additional security analysis tools including NMAP, AMAP, eEye, as well as tools such as Metasploit Framework, Netcat, Socat, and Nikto. Progent can show you how to make sense of audit reports and respond effectively.

Progent can show you how to design security into your company operations, configure auditing applications, plan and implement a protected system architecture, and recommend policies to optimize the security of your network. Progent's security professionals are able to show you how to configure a firewall, design safe remote access to email and data, and install virtual private network. Learn more on Progent's network security evaluation.

Security Inventory and Evaluation Packages for Small Companies
Progent offers two ultra-affordable security inventory scanning bundles designed to allow small businesses to receive an objective network security assessment from an accredited security consultant. With Progent's External Security Inventory Checkup, an engineer runs a comprehensive test of your IT infrastructure from outside your company firewall to uncover possible weaknesses in the security profile you expose to the outside world. With Progent's Internal Network Security Inventory Scan, a security expert executes a network scan from an authorized machine inside your company firewall to evaluate your exposure to inside threats. Both security inventory packages are set up and executed from a secured external site. The project is overseen by an engineer with high-level security accreditations and who produces a report that summarizes and interprets the data captured by the security scan and suggests cost-effective remediation if called for.

Network Security Penetration Analysis Consulting
Stealth penetration checking is a key part of any successful IT system security plan. Progent’s security experts can run thorough penetration checks without the awareness of your company's internal IT staff. Unannounced penetration checking shows whether existing security monitoring tools such as intrusion incident alerts and event history analysis are correctly set up and actively checked. Learn more about Progent's network penetration analysis support services.

Firewall and Virtual Private Network Expertise
Progent's expertise in security solutions includes in-depth familiarity with major firewalls and Virtual Private Network products offered by a variety of companies including Cisco, Microsoft, and Symantec. Progent offers the support of engineers with key networking accreditations such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Integration and Debugging
The new ASA 5500-X Family of firewalls with Firepower Services provide significantly more value than Cisco's previous firewalls and have replaced the ASA 5500 and PIX security appliances for new deployments. Since Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system (IPS). Firepower services provide enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can assist you to maintain your legacy PIX or ASA 5500 firewalls or upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your organization to design, configure, tune, administer and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Learn more information about Cisco ASA 5500-X Firewalls with Firepower Services integration and troubleshooting support.

Cisco Security and Virtual Private Network Support Services
Cisco's security and remote connection products offer a complete range of manageable security solutions to help safeguard your local and remote network infrastructure. Cisco's VPN product family includes routers, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's expert consulting staff includes experienced specialists with Cisco's Certified Internetwork Expert and CCNP certifications who can assist your company to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that align most closely with your business objectives. Find out additional details about Progent's Engineering Expertise for Cisco Security Technology and Virtual Private Network Appliances.

Support Expertise for Additional Firewall and Virtual Private Network Solutions
Progent provides small and medium size businesses expert consulting for Intrusion Protection Systems and IPsec VPN technology from leading firewall and VPN security companies including WatchGuard, Juniper, and SonicWALL. Progent can help you design a comprehensive security strategy and choose the right technologies from a variety of vendors to support your security goals while sticking within your budget limits.

Progent's Low-Cost Managed Services for Information Security
Progent's low-cost ProSight line of network monitoring and management services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates cutting edge behavior machine learning tools to defend endpoints as well as servers and VMs against modern malware attacks such as ransomware and file-less exploits, which routinely escape traditional signature-matching anti-virus products. ProSight ASM safeguards local and cloud resources and provides a single platform to automate the complete threat lifecycle including filtering, identification, containment, remediation, and forensics. Key capabilities include single-click rollback using Windows Volume Shadow Copy Service and real-time system-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection (ESP) services offer economical in-depth security for physical and virtual servers, desktops, mobile devices, and Exchange Server. ProSight ESP uses adaptive security and advanced heuristics for continuously monitoring and reacting to cyber assaults from all attack vectors. ProSight ESP provides two-way firewall protection, penetration alerts, endpoint management, and web filtering through cutting-edge tools packaged within a single agent accessible from a unified console. Progent's data protection and virtualization experts can assist your business to design and implement a ProSight ESP environment that meets your company's specific requirements and that allows you achieve and demonstrate compliance with legal and industry data protection regulations. Progent will help you specify and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alerts that call for urgent attention. Progent's consultants can also assist your company to install and test a backup and disaster recovery solution such as ProSight Data Protection Services so you can recover rapidly from a potentially disastrous security attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection unified endpoint security and Exchange filtering.

ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services provide small and mid-sized businesses an affordable and fully managed solution for secure backup/disaster recovery (BDR). Available at a low monthly price, ProSight Data Protection Services automates and monitors your backup activities and allows fast recovery of critical data, applications and virtual machines that have become unavailable or damaged as a result of hardware breakdowns, software bugs, disasters, human error, or malware attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local device, or mirrored to both. Progent's BDR specialists can deliver world-class expertise to set up ProSight DPS to be compliant with regulatory requirements like HIPPA, FIRPA, PCI and Safe Harbor and, whenever needed, can help you to recover your critical data. Learn more about ProSight Data Protection Services Managed Cloud Backup and Recovery.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the technology of top information security companies to provide web-based management and world-class protection for your email traffic. The powerful structure of Email Guard combines cloud-based filtering with an on-premises security gateway device to offer complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based malware. The cloud filter serves as a preliminary barricade and keeps the vast majority of unwanted email from reaching your network firewall. This decreases your vulnerability to external attacks and saves network bandwidth and storage. Email Guard's onsite security gateway device adds a further level of analysis for inbound email. For outgoing email, the on-premises security gateway provides anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The local security gateway can also help Exchange Server to monitor and protect internal email traffic that originates and ends within your security perimeter. For more information, visit ProSight Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and apps hosted in a secure fault tolerant data center on a high-performance virtual machine host set up and managed by Progent's IT support experts. Under Progent's ProSight Virtual Hosting model, the client owns the data, the operating system software, and the applications. Because the system is virtualized, it can be ported immediately to a different hardware environment without requiring a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, you are not tied a single hosting service. Learn more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, find and safeguard information about your IT infrastructure, processes, business apps, and services. You can quickly find passwords or serial numbers and be alerted automatically about impending expirations of SSL certificates or warranties. By updating and managing your network documentation, you can save as much as half of time spent searching for critical information about your IT network. ProSight IT Asset Management features a common location for storing and collaborating on all documents required for managing your business network like standard operating procedures and How-To's. ProSight IT Asset Management also offers advanced automation for collecting and relating IT information. Whether you’re planning enhancements, doing regular maintenance, or responding to a crisis, ProSight IT Asset Management gets you the knowledge you require the instant you need it. Learn more about ProSight IT Asset Management service.

Certified Network Security Consulting
Every business ought to have a carefully considered security strategy that includes both proactive procedures and reaction plans. The pre-attack plan is a collection of steps designed to minimize security weaknesses. The reactive plan assists your IT security engineers to evaluate the damage caused by a security penetration, fix the system, document the event, and get the IT network restored as soon as feasible.

Progent's expert information security consultants are available to assist your business to perform a comprehensive risk assessment and create a network security strategy to implement security policies and mechanisms to reduce ongoing assaults and threats.

CISM Certified Information Security Engineering Assistance
The CISM organization describes the basic competencies and worldwide standards of skill that information security managers are required to learn. It provides executive management the assurance that those who have earned their CISM certification possess the background and knowledge to deliver efficient security administration and consulting services. Progent offers the support of CISM certified security professionals to help companies with:

  • IS Security Governance
  • Vulnerability Management
  • IS Security Implementation Management
  • IS Security Management
  • Recovery Planning
Read additional information about Progent's CISM Accredited Information Security Support Professionals.

CISSP Qualified Security Engineering Services
CISSP recognizes mastery of a worldwide standard for information security. ANSI (American National Standards Institute) has awarded the CISSP credential accreditation in the field of data protection under ISO/IEC 17024. Progent offers access to of security experts who have qualified for CISSP certification. Progent can provide a CISSP-certified professional to help your company in a variety security fields including:

  • Security Management Procedures
  • Security Architecture and Paradigms
  • Access Management Systems and Methodology
  • Software Development Security
  • Secure Operations
  • Site Security
  • Encryption/Decryption Mechanisms
  • Telecom, Network and WAN Security
  • Business Continuity Preparedness
Read additional information concerning Progent's CISSP-certified IS Security Support Professionals.

ISSAP Qualified Secure IT Architecture Engineering Expertise
Progent's ISSAP qualified information system architecture professionals are consultants who have been awarded ISSAP Certification through thorough examination and significant work with information security design. The ISSAP certification indicates proven competence in the most complex requirements of information security architecture bounded by the broader field of information system security knowledge required for CISSP certification. Progent's ISSAP-certified security consultants can assist your business with all phases of architecture security including.

  • Access Control Systems and Techniques
  • Telecommunications and System Infrastructure Protection
  • Cryptography Solutions
  • Requirements Analysis and Security Criteria
  • Business Continuity Planning and DRP
  • Hardware Security
Read additional details concerning Progent's ISSAP Certified Secure System Architecture Engineering Expertise.

CISA Accredited Security Auditing Consulting Support
The Certified Information Systems Auditor accreditation is an important qualification that represents expertise in network security audit and control. Accredited by the American National Standards Institute, the CISA credential requires that consultants pass a comprehensive examination given by the ISACA professional association. Progent's CISA-certified network security audit experts can help your business with:

  • IS Audit Process
  • IT Governance
  • Systems and Infrastructure Lifecycle Planning
  • IT Service Delivery
  • Protecting Data Resources
  • Disaster Recovery Preparedness
Read more details about Progent's CISA Qualified Information System Security Auditing Engineering Services.

CRISC Consultants
The CRISC program was initiated by ISACA in 2010 to validate a consultant's skills to design, implement, and maintain information system controls to reduce network risk. Progent offers the services of a CRISC-certified consultant to help your company to create and execute a workplace continuity or disaster recovery plan that follows leading practices promoted by CRISC and crafted to match your company's risk appetite, business goals, and IT budget. Progent's CRISC-qualified network risk mitigation specialists offer a variety of risk evaluation services including:

  • Gather data and review documentation to help identify significant vulnerabilities
  • Inventory statutory, regulatory, and business requirements and company policies associated with your network to determine their potential influence on your business goals
  • Point out potential vulnerabilities for your business processes to help in evaluating your corporate risk
  • Develop a risk awareness initiative and provide seminars to ensure your stakeholders appreciate IS risk so they can assist with your risk management process
  • Connect identified risk scenarios to related operational procedures to help assign risk ownership
  • Determine risk tolerance with your senior leadership and major stakeholders to make sure they align
Get additional information concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Certified IS Security Consulting Assistance
GIAC was founded in 1999 to certify the knowledge of computer security professionals. GIAC's mission is to assure that a certified security consultant has the skills necessary to deliver services in important categories of system, data, and program security. GIAC certifications are recognized by companies and institutions throughout the world including and the United States NSA. Progent's GIAC-certified IS security audit consultants are available to assist your IT organization with:

Read additional information concerning Progent's GIAC Information Assurance Expertise.

Talk to a Certified Security Specialist
To see how you can get in touch with a certified Progent security consultant for remote or on-premises support in Oklahoma, phone 1-800-993-9400 or go to Online Computer Help.

© 2002- 2018 Progent Corporation. All rights reserved.