Small business information networks in Oklahoma can depend on prompt and affordable online access to Progent's accredited security support specialists to help with complex security issues. The cost is affordable, billing is per minute, engagement is immediate, and service is world class. Progent also offers help for long-term projects that requires the services of seasoned security engineers with high-level security certifications.

If your Oklahoma office is outside of larger urban areas like Oklahoma City, Tulsa, Norman, or Lawton, the availability of local accredited security experts is often limited when you have a crisis. This can cause a loss of income for your business, upset clients, unproductive employees, and distracted management. By contacting Progent's remote support, you can get in touch with a certified security consultant ready to deliver expertise when you require it to get your information system on line and recover your information.

Progent can assist you in a variety of ways in your initiatives to defend your IT environment with support services ranging from network security checks to developing a comprehensive security plan. Progent provides economical support to assist small and midsize companies to design and maintain safe networks powered by Microsoft Windows and Cisco products and that may include servers and desktops running UNIX, Linux, Solaris, or Apple Mac OS X platforms plus mobile clients with Apple iOS handhelds or Android or Windows Phone handsets.

Progent can also help you outsource spam filtering and defense against e-mail-based attacks. Email Guard is Progent's email filtering and encryption solution that uses the technology of top data security vendors to deliver centralized management and comprehensive security for your email traffic. The hybrid structure of Email Guard managed service integrates a Cloud Protection Layer with a local gateway device to offer complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne malware. The cloud filter acts as a preliminary barricade and blocks the vast majority of threats from reaching your security perimeter. This decreases your exposure to inbound attacks and saves system bandwidth and storage space. Email Guard's onsite gateway device provides a further layer of analysis for inbound email. For outbound email, the on-premises gateway offers anti-virus and anti-spam protection, DLP, and email encryption. The on-premises gateway can also assist Exchange Server to track and protect internal email that originates and ends inside your corporate firewall.

Progent's security engineers are available online or in person to provide a variety of emergency or longer-term IT security services including:

  • Run thorough network security evaluations
  • Recuperate rapidly after virus and worm attacks
  • Set up effective firewalls
  • Implement safe techniques for offsite and mobile access
  • Deploy advanced applications for protection against viruses, spam and directory harvest attacks
  • Develop a company-wide security strategy with 24x7 security monitoring
  • Offer outsourced Help Desk Support
  • Develop a practical network backup and restore solution built around Microsoft DPM high-availability technology
If your company has an urgent need for computer security support, go to Progent's Emergency Remote Technical Help.

Progent's consultants offer advanced support in vital fields of computer protection that include analysis, firewall and VPN solutions, and high-level security consulting.

System Security Evaluation
Progent's expert security consultants can evaluate the effectiveness of your current computer security systems through comprehensive remote automated testing based on advanced software tools and tested techniques. Progent's experience in this testing saves you money and offers an objective picture of gaps. The knowledge your business is provided can form the basis of a network protection plan that can permit your network to run safely and respond rapidly to future risks.

Automated Network Vulnerability Analysis
Progent provides consulting in the application of security evaluation software including MBSA and GFI LANguard for affordably running a variety of automatic network auditing scans to uncover potential security gaps. Progent has broad experience with additional security analysis products such as NMAP Port Scanner, AMAP, eEye Vulnerability Scanner, as well as tools such as Metasploit, Netcat, Hydra, and Nikto. Progent can show you how to understand testing reports and respond effectively.

Progent can show you how to build security into your business processes, configure auditing tools, define and implement a secure system architecture, and suggest procedures to optimize the security of your IT system. Progent's security engineers are able to show you how to configure a firewall, design safe remote access to email and business applications, and install VPN. Find out more on Progent's automated security assessment.

Security Inventory and Evaluation Packages for Small Businesses
Progent has put together two ultra-affordable security inventory and evaluation packages intended to allow small businesses to get an objective network security evaluation from an accredited security expert. With Progent's External Network Security Inventory Scan, a security expert runs an extensive test of your IT infrastructure from beyond your firewalled perimeter to determine possible weaknesses in the security posture you expose to the public. With Progent's Internal Network Security Inventory Scan, a security engineer runs a system scan from an authorized machine inside your company firewall to uncover vulnerabilities to internal assaults. Both security inventory packages are set up and run from a secured external location. The process is directed by a consultant who has earned top security accreditations and who generates a report that summarizes and interprets the data captured by the security scan and proposes practical improvements if called for.

Stealth Security Penetration Testing Support Services
Stealth intrusion testing is an important component of any serious IT system security plan. Progentís security experts can perform thorough intrusion checks without the knowledge of your company's internal network support resources. Unannounced penetration checking uncovers whether existing security defense tools such as intrusion detection alerts and event history analysis are correctly configured and actively monitored. Learn additional information on Progent's network security penetration testing consulting.

Firewall And Virtual Private Network (VPN) Expertise
Progent's expertise in network security technology includes extensive familiarity with major firewalls and Virtual Private Network products from a variety of vendors such as Cisco, Microsoft, and CheckPoint. Progent offers the support of consultants who have earned important networking certifications such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Integration and Troubleshooting
The current ASA 5500-X Family of firewalls with Firepower Services provide significantly more value than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX firewalls for new deployments. Since Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X devices can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the world's most deployed intrusion protection system. Firepower services provide enhanced capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can assist your company to maintain your legacy PIX or Cisco ASA 5500 firewalls or migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your company to design, deploy, tune, manage and debug firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. See more information about Cisco ASA 5500-X Firewalls with Firepower configuration and troubleshooting support.

Cisco Security and VPN Engineering Expertise
Cisco's security and remote connection products offer a full range of easy-to-administer security products to help protect your local and remote network infrastructure. Cisco's VPN line includes switches, firewalls, intrusion detection systems and VPN appliances. Progent's professional consulting staff includes field-proven specialists with Cisco Certified Internetwork Expert and Cisco Certified Network Professional qualifications who can help your company to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that align best with your business goals. Learn additional details concerning Progent's Engineering Services for Cisco Security and VPN Products.

Support Services for Other Firewall and VPN Technology
Progent offers small and mid-size businesses expert support for Intrusion Protection products and IPsec VPN products from major firewall and VPN security vendors such as Check Point Software, Juniper, and Symantec. Progent can show you how to design a comprehensive security plan and select appropriate technologies from a variety of suppliers to support your security objectives while sticking within your budget restraints.

Certified Security Design
Every business ought to have a thoroughly considered security strategy that includes both proactive processes and response planning. The proactive plan is a collection of steps intended to minimize vulnerabilities. The reactive strategy assists your IT security engineers to evaluate the impact resulting from an attack, fix the system, record the experience, and get the IT network running as rapidly as possible.

Progent's expert IS security engineers are available to help your business to perform a comprehensive vulnerability assessment and define a company-wide security strategy to implement security processes and mechanisms to mitigate future assaults and threats.

CISM Qualified Information Security Consulting Expertise
The CISM committee describes the basic capabilities and international standards of performance that IT security professionals are required to learn. CISM provides business management the confidence that consultants who have earned their CISM certification possess the background and capability to provide effective security management and support services. Progent can provide the expertise of CISM qualified security professionals to help companies with:

  • IS Security Governance
  • Risk Analysis
  • IS Security Program Management
  • Information Security Management
  • Recovery Management
Read more details about Progent's CISM Accredited IS Security Support Expertise.

CISSP Certified Security Engineering Services
The CISSP credential recognizes mastery of a worldwide standard for data security. ANSI (American National Standards Institute) has granted the CISSP credential recognition in the area of information security stipulated by ISO 17024. Progent can provide the services of security experts who have qualified for CISSP certification. Progent can give you access to a CISSP-certified professional to help your company in a variety security fields including:

  • Security Administration Practices
  • Security Infrastructure and Models
  • Access Control Systems and Processes
  • Software Development Security
  • Secure Operations
  • Physical Security
  • Cryptography Technology
  • Telecom, Network and Internet Security
  • Business Continuity Planning
Learn additional details about Progent's CISSP-certified Information Security Engineering Services.

ISSAP Accredited Secure System Architecture Consulting Support
Progent's ISSAP qualified information system architecture engineers are experts who have been awarded ISSAP status as a result of thorough testing and extensive work with information security architecture. The Information System Security Architecture Professional (ISSAP) credential represents demonstrated skill in the more in-depth demands of IS security architecture bounded by the wider field of information system security knowledge required for CISSP certification. Progent's ISSAP-qualified security experts can help your company with all aspects of secure network architecture including.

  • Access Control Mechanisms and Techniques
  • Telecommunications and Network Infrastructure Protection
  • Data Encryption Options
  • Requirements Evaluation and Security Guidelines
  • Business Continuity Planning and DRP
  • Site Security
Learn additional details concerning Progent's ISSAP Accredited Secure Network Architecture Engineering Professionals.

CISA Certified Information System Security Auditing Consulting Assistance
The CISA accreditation is an important qualification that represents mastery in IS security auditing. Accredited by ANSI, the CISA credential requires that consultants undergo a comprehensive test given by the ISACA professional association. Progent's CISA-certified security audit specialists can help your IT organization with:

  • Information Systems Audit Services
  • Information Technology Governance
  • Network Assets and Infrastructure Lifecycle Planning
  • IT Support
  • Safeguarding Data Assets
  • Business Continuity Preparedness
Learn more details concerning Progent's CISA Certified Network Security Auditing Engineering Support.

CRISC Consultants
The CRISC certification program was initiated by ISACA to validate an IT professional's ability to design, deploy, and support information system controls to mitigate network risk. Progent offers the expertise of a CRISC-certified engineer to assist your company to develop and carry out a workplace continuity or disaster recovery plan based on industry best practices promoted by CRISC and crafted to align with your company's risk tolerance, business objectives, and IT budget. Progent's CRISC-certified IT risk management consultants can provide a variety of risk identification services including:

  • Gather information and study documentation to evaluate significant vulnerabilities
  • Inventory statutory, industry, and contractual requirements and organizational policies associated with your network to assess their possible impact on your business goals
  • Point out possible threats for your operational processes to help in analyzing your corporate risk
  • Create a risk awareness initiative and conduct seminars to ensure your organization understand information system risk so they can assist with your risk control process
  • Connect identified risk scenarios to your associated operational processes to help assign risk responsibility
  • Validate risk tolerance with executive management and key stakeholders to ensure they align
Read more details about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Accredited Information System Security Engineering Assistance
GIAC was founded in 1999 to certify the knowledge of information technology security professionals. GIAC's mission is to verify that an accredited professional has the knowledge appropriate to provide services in critical categories of system, information, and application security. GIAC certifications are recognized by businesses and institutions all over the world including and the U.S. National Security Agency. Progent's GIAC-certified network security audit specialists can help your IT organization with:

  • Auditing Networks
  • Incident Handling
  • Intrusion Detection
  • Web-based Services Security
  • SIEM solutions
Find out more details concerning Progent's GIAC Information Assurance Expertise.

Get in Touch with a Security Specialist
To learn how you can get in touch with a security engineer for remote or on-premises help in Oklahoma, call 1-800-993-9400 or go to Remote Computer Help.

© 2002- 2017 Progent Corporation. All rights reserved.