Small business networks in the state of Oklahoma can now get fast and affordable remote technical support from Progent's certified security consultants to resolve complex security issues. Rates are reasonable, charges are by the minute, engagement is fast, and support is world class. Progent also provides help for complex projects that demand the services of senior security engineers with top industry credentials.

In case your Oklahoma small business is located outside of larger urban areas including Oklahoma City, Tulsa, Norman, or Lawton, access to nearby qualified security consultants is often problematic when you have an urgent situation. This can result in a loss of productivity for your business, angry customers, unproductive employees, and defocused executives. By contacting Progent, you have access to a certified security consultant ready to offer help whenever you require it to get your computer network operating and salvage your information.

Progent can assist you in a variety of ways in your efforts to protect your network with services ranging from network security assessments to creating a comprehensive security plan. Progent offers economical service to assist small and midsize companies to design and manage secure IT environments powered by Windows and Cisco products and that can include servers and desktops based on UNIX or Linux platforms plus BYOD clients with Apple iOS iPhones and iPads or Google Android or Windows Phone handsets.

Progent can also assist you to outsource spam filtering and protection from email-borne attacks. Email Guard is Progent's email filtering and encryption platform that uses the technology of top data security companies to deliver centralized control and comprehensive protection for your inbound and outbound email. The hybrid structure of Email Guard managed service combines cloud-based filtering with an on-premises gateway appliance to provide advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne malware. The cloud filter serves as a first line of defense and keeps the vast majority of unwanted email from making it to your network firewall. This decreases your exposure to inbound attacks and conserves system bandwidth and storage space. ProSight Email Guard's on-premises gateway device provides a deeper level of inspection for inbound email. For outbound email, the local gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and encryption. The local security gateway can also help Exchange Server to track and protect internal email that stays inside your corporate firewall.

Progent's security professionals are available remotely or on premises to provide a range of emergency or longer-term computer security services including:

If your company has an urgent requirement for IT security help, go to Progent's Emergency Online Technical Help.

Progent's security experts provide advanced services in key facets of system security including analysis, firewall and VPN expertise, and advanced security consulting.

System Evaluation
Progent's certified security consultants can assess the strength of your current computer protection systems by performing comprehensive remote automated analysis via advanced software tools and proven procedures. Progent's skill in administering this testing saves your company time and money and offers an accurate portrayal of gaps. The information your business gains can form the basis of a network protection plan that will permit your network to run dependably and react quickly to future risks.

Automated Security Assessment
Progent provides consulting in the application of security evaluation products including Microsoft Baseline Security Analyzer and LANguard from GFI for economically performing a set of programmed network auditing checks to uncover possible security problems. Progent has broad experience with additional network auditing products such as NMAP Port Scanner, AMAP Application Scanner, eEye, plus utilities such as Metasploit Framework, Netcat, Hydra, and Nikto. Progent can show you how to understand testing reports and respond effectively.

Progent can show you how to build protection into your company operations, configure scanning software, plan and implement a secure network architecture, and recommend policies to maximize the security of your IT system. Progent's security professionals are ready to help you configure a firewall, implement secure remote connectivity to email and business applications, and install virtual private network. Find out additional information about Progent's automated security audits.

Security Inventory and Evaluation Bundles for Small Businesses
Progent has put together two ultra-affordable security inventory and evaluation bundles intended to allow small businesses to get an objective security evaluation from an accredited security consultant. With Progent's External Network Security Inventory Checkup, a security engineer administers an extensive examination of your IT infrastructure from outside your firewalled perimeter to uncover potential weaknesses in the security profile you expose to the outside world. With Progent's Internal Network Security Inventory Checkup, an engineer runs a network scan from an authorized machine inside your firewall to assess vulnerabilities to inside attacks. The two security inventory packages are set up and run from a secured external location. The process is directed by an engineer with high-level security accreditations and who produces a report that summarizes and interprets the data collected by the scan and proposes cost-effective improvements where called for.

Network Penetration Testing Support Services
Stealth intrusion checking is a key component of any comprehensive network security plan. Progent’s security experts can perform thorough intrusion checks without the knowledge of your organization's internal IT resources. Unannounced penetration checking shows whether existing security monitoring systems such as intrusion detection alerts and event history analysis are properly set up and consistently checked. Learn more about Progent's network security penetration testing support services.

Firewall/VPN Support
Progent's expertise in network security solutions encompasses in-depth field work with major firewalls and Virtual Private Network technology offered by a variety of companies such as Cisco, Microsoft, and Symantec. Progent offers the support of consultants with key industry certifications including CCIE and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Integration and Debugging
The latest generation of ASA 5500-X Family of firewalls with Firepower Services provide substantially more performance than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 firewalls for all new deployments. Following Cisco's acquisition of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be configured to enable Firepower Services, built on Sourcefire's Snort product, which is the world's most popular network intrusion protection system (IPS). Firepower services provide enhanced features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can help your company to maintain your current PIX or ASA 5500 firewalls or migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite support for ASA 5500-X firewalls with Firepower Services and can assist you to plan, deploy, tune, administer and troubleshoot firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about ASA 5500-X Firewalls with Firepower configuration and debugging services.

Cisco Security and VPN Consulting Expertise
Cisco's network security and remote connection technology provide a complete range of manageable security products to help safeguard your wired and wireless information system. Cisco's Virtual Private Network product family features switches, firewalls, intrusion detection devices and VPN appliances. Progent's professional consulting staff includes experienced engineers with Cisco's CCIE and CCNP certifications who are able to help your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that align best with your business objectives. Learn more details concerning Progent's Consulting Expertise for Cisco Security and Virtual Private Network Products.

Support Expertise for Additional Firewall and VPN Technology
Progent offers small and medium size businesses expert consulting for Intrusion Protection products and IPsec VPN products from major firewall and VPN security vendors such as WatchGuard, Juniper Networks, and Symantec. Progent can help you design a comprehensive security plan and select the right products from multiple suppliers to support your security objectives while staying within your spending limits.

Progent's Flat-rate Managed Services for Information Assurance
Progent's low-cost ProSight family of network management outsourcing services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates next generation behavior machine learning technology to guard endpoint devices and physical and virtual servers against new malware assaults like ransomware and email phishing, which easily evade legacy signature-based AV tools. ProSight Active Security Monitoring safeguards local and cloud resources and provides a single platform to manage the complete malware attack progression including filtering, infiltration detection, containment, cleanup, and forensics. Top features include one-click rollback using Windows VSS and automatic system-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
Progent's ProSight Enhanced Security Protection services offer economical multi-layer security for physical servers and virtual machines, desktops, mobile devices, and Microsoft Exchange. ProSight ESP uses contextual security and modern behavior analysis for continuously monitoring and responding to security assaults from all attack vectors. ProSight ESP offers firewall protection, intrusion alarms, endpoint control, and web filtering via cutting-edge tools packaged within a single agent accessible from a unified console. Progent's data protection and virtualization consultants can help your business to plan and configure a ProSight ESP deployment that addresses your organization's unique needs and that allows you prove compliance with legal and industry data protection standards. Progent will assist you define and configure policies that ProSight ESP will manage, and Progent will monitor your network and respond to alerts that require immediate action. Progent can also help your company to set up and verify a backup and restore solution such as ProSight Data Protection Services (DPS) so you can recover rapidly from a destructive security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Microsoft Exchange email filtering.

ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services provide small and mid-sized businesses a low cost end-to-end service for secure backup/disaster recovery. For a low monthly price, ProSight DPS automates and monitors your backup activities and enables fast restoration of critical data, applications and virtual machines that have become lost or corrupted as a result of hardware breakdowns, software glitches, disasters, human error, or malware attacks such as ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, applications, system images, plus Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to an on-promises device, or to both. Progent's backup and recovery specialists can provide advanced support to configure ProSight Data Protection Services to to comply with government and industry regulatory requirements like HIPPA, FIRPA, PCI and Safe Harbor and, when needed, can help you to recover your critical data. Find out more about ProSight Data Protection Services Managed Backup and Recovery.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that incorporates the technology of top information security companies to deliver centralized control and comprehensive protection for all your inbound and outbound email. The powerful structure of Email Guard integrates cloud-based filtering with an on-premises security gateway appliance to provide complete protection against spam, viruses, Dos Attacks, DHAs, and other email-based threats. The cloud filter acts as a preliminary barricade and blocks the vast majority of threats from reaching your security perimeter. This decreases your exposure to inbound threats and saves network bandwidth and storage space. Email Guard's on-premises security gateway device adds a deeper layer of inspection for incoming email. For outgoing email, the onsite gateway offers anti-virus and anti-spam filtering, DLP, and email encryption. The on-premises security gateway can also assist Exchange Server to track and protect internal email traffic that originates and ends inside your corporate firewall. For more details, visit Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and apps hosted in a secure Tier III data center on a fast virtual machine host configured and managed by Progent's network support experts. Under Progent's ProSight Virtual Hosting service model, the customer owns the data, the operating system software, and the apps. Since the system is virtualized, it can be moved immediately to a different hardware environment without a lengthy and difficult reinstallation procedure. With ProSight Virtual Hosting, you are not locked into one hosting provider. Learn more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, retrieve and safeguard data related to your IT infrastructure, procedures, business apps, and services. You can instantly find passwords or serial numbers and be warned about impending expirations of SSL certificates or domains. By updating and managing your IT infrastructure documentation, you can eliminate up to half of time wasted looking for vital information about your IT network. ProSight IT Asset Management features a common location for holding and collaborating on all documents related to managing your business network like standard operating procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and relating IT information. Whether you’re planning improvements, doing regular maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the data you require as soon as you need it. Find out more about ProSight IT Asset Management service.

Expert Network Security Design
Any business ought to have a carefully considered security strategy that includes both preventive procedures and response planning. The pre-attack strategy is a collection of mechanisms that help to minimize security weaknesses. The post-attack strategy assists your security engineers to assess the impact caused by an attack, repair the system, record the experience, and get business functions running as rapidly as feasible.

Progent's expert information security engineers are available to help your business to run a complete vulnerability assessment and define a network security plan to implement security processes and controls to minimize future assaults and threats.

CISM Accredited Network Security Support Services
The Certified Information Security Manager (CISM) committee describes the basic capabilities and international standards of performance that information security managers are expected to master. It gives executive management the assurance that consultants who have qualified for their CISM credential possess the background and knowledge to deliver efficient security administration and consulting consulting. Progent offers the expertise of CISM qualified security professionals to assist businesses with:

  • Information Security Governance
  • Risk Management
  • IS Security Implementation Management
  • Information Security Administration
  • Response Planning
Find out more details concerning Progent's CISM Accredited Information Security Engineering Professionals.

CISSP Certified Security Engineering Expertise
CISSP certification denotes expertise with an international standard for data security. The American National Standards Institute has awarded certification accreditation in the field of data protection stipulated by ISO 17024. Progent offers the services of security professionals who have qualified for CISSP certification. Progent can give you access to a CISSP-certified expert to help your organization in a broad range of security areas including:

  • Security Administration Practices
  • Security Infrastructure and Models
  • Access Management Systems and Methodology
  • Applications Development Security
  • Secure Operations
  • Site Security
  • Encryption/Decryption Mechanisms
  • Telecommunications, Network and Internet Security
  • Disaster Recovery Planning
Find out additional details about Progent's CISSP-certified Security Consulting Services.

CISSP-ISSAP Certified Secure System Architecture Consulting Support
Progent's CISSP-ISSAP certified network architecture engineers are consultants who have been awarded ISSAP Certification through thorough examination and extensive work with network security architecture. The Information System Security Architecture Professional (ISSAP) credential indicates proven competence in the most challenging requirements of IS security architecture bounded by the broader scope of information system security expertise required for CISSP certification. Progent's ISSAP-qualified security specialists can help your business with all aspects of architecture security such as.

  • Access Management Mechanisms and Techniques
  • Telecom and Network Infrastructure Security
  • Data Encryption Options
  • Needs Analysis and Security Guidelines
  • Business Continuity Planning and Disaster Recovery Planning (DRP)
  • Site Security
Read more information about Progent's ISSAP Certified Secure System Architecture Support Expertise.

CISA Accredited Network Security Auditing Engineering Expertise
The Certified Information Systems Auditor (CISA) credential is an important qualification that represents mastery in information system security audit and control. Certified by the American National Standards Institute, the CISA credential requires that consultants undergo an extensive examination administered by the ISACA international professional association. Progent's CISA-qualified IS security audit consultants are available to help your IT organization in the areas of:

  • IS Audit Process
  • Information Technology Governance
  • Network Assets and Infrastructure Lifecycle Planning
  • IT Service Delivery
  • Protecting Data Resources
  • Business Continuity Preparedness
Read additional details concerning Progent's CISA Certified Network Security Auditing Engineering Support.

Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC certification program was established by ISACA to verify an IT professional's ability to plan, deploy, and support IS controls to mitigate risk. Progent can provide the expertise of a CRISC-certified consultant to assist you to develop and execute a business continuity or disaster recovery strategy based on industry best practices promoted by CRISC and geared to match your company's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC-qualified network risk management consultants can provide a range of risk identification services such as:

  • Collect data and review documentation to identify major vulnerabilities
  • Identify legal, regulatory, and business mandates and company policies related to your information system to assess their possible impact on your business objectives
  • Point out possible vulnerabilities for your business workflows to help in evaluating your enterprise risk
  • Develop a risk awareness initiative and provide seminars to make sure your organization appreciate IS risk so they can contribute to your risk management process
  • Match key risk scenarios to your associated business processes to help assign risk responsibility
  • Determine risk tolerance with your senior leadership and key stakeholders to ensure they align
Learn additional details about Progent's CRISC Risk Management Experts.

GIAC Accredited Network Security Engineering Assistance
Global Information Assurance Certification was established in 1999 to validate the skill of IT security experts. GIAC's goal is to make sure that an accredited professional possesses the skills needed to provide services in vital areas of system, information, and program security. GIAC accreditations are recognized by companies and institutions around the world including and the U.S. NSA. Progent's GIAC network security audit engineers are available to assist your IT organization in the areas of:

Learn more details about Progent's GIAC Information Assurance Support.

Contact a Progent Security Engineer
To find out how to access a certified Progent security consultant for online or on-premises support in Oklahoma, call 1-800-993-9400 or visit Online Computer Support.

© 2002- 2019 Progent Corporation. All rights reserved.