Company IT networks in Oklahoma can have prompt and affordable online technical support from Progent's qualified security experts to resolve the toughest security issues. Rates are affordable, charges are by the minute, engagement is quick, and support is world class. Progent also provides help for complex engagements that requires the knowledge of senior security consultants with high-level security credentials.

In case your Oklahoma network is situated outside of more populated urban areas such as Oklahoma City, Tulsa, Norman, or Lawton, support from local qualified network security support specialists is often limited when there's an emergency. This can result in a drop in income for your business, upset customers, unproductive employees, and defocused management. By utilizing Progent's remote support, you can get in touch with a qualified security engineer ready to offer expertise whenever you have to have it to get your system on line and recover your data.

Progent can help you in a variety of ways in your efforts to guard your information system with support ranging from security audits to developing a comprehensive security plan. Progent offers economical support to assist small and midsize companies to configure and maintain protected IT environments based on Microsoft Windows and Cisco technology and that may include servers and desktops based on UNIX or Linux platforms plus mobile users with Apple iOS handhelds or Android or Windows Phone handsets.

Progent can also show you how to outsource spam blocking and protection from e-mail-based assaults. Email Guard is Progent's email filtering and encryption solution that uses the technology of leading information security companies to deliver centralized control and world-class security for your email traffic. The hybrid structure of Progent's Email Guard integrates cloud-based filtering with an on-premises gateway device to offer complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based malware. The cloud filter acts as a first line of defense and keeps most threats from making it to your network firewall. This decreases your exposure to external attacks and saves network bandwidth and storage space. ProSight Email Guard's on-premises security gateway appliance adds a deeper level of inspection for inbound email. For outbound email, the on-premises gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and encryption. The on-premises gateway can also help Microsoft Exchange Server to monitor and protect internal email that stays within your security perimeter.

Progent's certified consultants are accessible remotely or on premises to provide a range of emergency or project-based IT security services including:

  • Perform thorough security audits
  • Clean up promptly after virus and worm attacks
  • Configure effective firewalls
  • Configure safe solutions for offsite and mobile connectivity
  • Deploy effective software for protection against viruses, spam and directory harvest attacks
  • Develop a company-wide security plan with 24x7 monitoring
  • Offer outsourced Call Center Services
  • Create an effective backup and restore strategy centered on Data Protection Manager automated backup technology
If your network has an immediate need for computer security support, go to Progent's Urgent Online Network Support.

Progent's security experts offer world-class support in vital areas of computer protection including security evaluation, firewall and VPN solutions, and advanced security consulting.

System Audits
Progent's expert security engineers can assess the vulnerability of your current computer protection environment through comprehensive remote automated testing based on sophisticated software tools and tested techniques. Progent's skill in this testing saves your company money and offers an accurate picture of gaps. The knowledge your IT organization gains can form the basis of a network protection strategy that will allow your information system to run dependably and respond rapidly to new risks.

Automated Network Security Audits
Progent offers expertise in the use of security analysis utilities such as Microsoft Baseline Security Analyzer and GFI LANguard for affordably performing a variety of automatic system testing checks to uncover possible security problems. Progent has broad experience with additional network auditing utilities including NMAP, AMAP application mapper, eEye, as well as tools like Metasploit Framework, Netcat, Socat, and Nikto. Progent can help you to make sense of testing reports and respond effectively.

Progent can show you how to build protection into your business operations, configure scanning tools, define and implement a secure network environment, and suggest procedures to maximize the safety of your IT system. Progent's security consultants are ready to show you how to configure a firewall, implement secure remote access to email and data, and install VPN. Find out more concerning Progent's network security analysis.

Security Inventory Service Packages for Small Businesses
Progent offers two ultra-affordable security inventory and evaluation packages designed to allow small businesses to get a professional security assessment from a certified security engineer. With Progent's External Network Security Inventory Scan, an engineer administers a comprehensive examination of your IT infrastructure from outside your company firewall to uncover potential risks in the security profile you expose to the outside world. With Progent's Internal Network Security Inventory Checkup, an engineer runs a system scan from a secure machine inside your firewall to evaluate your exposure to internal attacks. The two security inventory services are configured and executed from a protected external location. The process is directed by a consultant with high-level security accreditations and who produces a report that details and interprets the data collected by the security scan and suggests practical improvements where called for.

Stealth Intrusion Analysis Support Services
Stealth intrusion testing is an important part of any successful IT system security plan. Progentís security experts can run thorough penetration tests without the knowledge of your organization's internal IT resources. Stealth penetration testing uncovers whether existing security defense tools such as intrusion incident alerts and event log analysis are properly set up and actively monitored. Find out additional information concerning Progent's stealth security penetration analysis consulting.

Firewalls and VPN Support
Progent's expertise in network security solutions includes in-depth familiarity with major firewalls and Virtual Private Network (VPN) technology offered by a variety of companies including Cisco, Microsoft, and CheckPoint. Progent can provide the services of engineers who have earned key industry accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Configuration and Troubleshooting
The latest generation of ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide substantially more performance than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX security appliances for all new installations. After Cisco's purchase of Sourcefire, the whole line of ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular intrusion protection system (IPS). Firepower services provide enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network consultants can assist you to manage your legacy PIX or Cisco ASA 5500 firewalls and migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your business to plan, integrate, tune, administer and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about Cisco ASA Firewalls with Firepower integration and debugging support.

Cisco Network Security and Virtual Private Network Consulting Expertise
Cisco's security and remote access products provide a full range of easy-to-administer security solutions to help safeguard your wired and wireless network infrastructure. Cisco's VPN line features switches, firewalls, intrusion detection devices and VPN concentrators. Progent's expert consulting staff includes experienced specialists with Cisco CCIE and Cisco Certified Network Professional certifications who can help your company to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that fit best with your company objectives. Find out additional information concerning Progent's Support Services for Cisco Security Solutions and VPN Appliances.

Support Expertise for Additional Firewall and Virtual Private Network Products
Progent offers small and medium size organizations professional consulting for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and Virtual Private Network security companies including Check Point Software, Juniper Networks, and SonicWALL. Progent can show you how to create a detailed security strategy and select appropriate technologies from a variety of suppliers to achieve your security goals while staying within your spending restraints.

Progent's Low-Cost Managed Services for Information Assurance
Progent's low-cost ProSight line of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services available from Progent include:
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email filtering and encryption platform that incorporates the services and infrastructure of top data security companies to deliver web-based management and world-class protection for all your inbound and outbound email. The hybrid structure of Email Guard managed service integrates a Cloud Protection Layer with an on-premises security gateway appliance to provide complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The cloud filter serves as a first line of defense and keeps most threats from reaching your security perimeter. This reduces your vulnerability to external threats and saves network bandwidth and storage space. ProSight Email Guard's onsite gateway appliance provides a deeper level of inspection for incoming email. For outgoing email, the on-premises security gateway offers AV and anti-spam protection, DLP, and encryption. The onsite gateway can also assist Exchange Server to track and safeguard internal email that originates and ends within your corporate firewall. Find out more about Progent's ProSight Email Guard Spam Filtering, Virus Defense, Email Content Filtering and Data Leakage Protection.

ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection solution that utilizes cutting edge behavior-based analysis tools to guard endpoint devices as well as servers and VMs against new malware attacks like ransomware and file-less exploits, which easily get by traditional signature-based AV tools. ProSight Active Security Monitoring protects local and cloud resources and provides a single platform to address the entire threat lifecycle including protection, infiltration detection, containment, cleanup, and post-attack forensics. Key features include single-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against newly discovered attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) Next-Generation Endpoint Protection and Ransomware Recovery.

ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services provide small and mid-sized organizations a low cost end-to-end service for secure backup/disaster recovery (BDR). For a fixed monthly cost, ProSight DPS automates your backup activities and enables rapid recovery of critical files, applications and virtual machines that have become unavailable or corrupted as a result of hardware breakdowns, software glitches, disasters, human error, or malicious attacks like ransomware. ProSight DPS can help you protect, recover and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware images. Critical data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's cloud backup specialists can deliver world-class expertise to configure ProSight Data Protection Services to to comply with regulatory standards like HIPPA, FINRA, and PCI and, when needed, can assist you to restore your critical data. Find out more about ProSight Data Protection Services Managed Cloud Backup.

Expert Security Consulting
Every business ought to have a thoroughly considered security strategy that includes both pre-attack processes and response planning. The pre-attack strategy is a set of mechanisms that help to reduce security weaknesses. The post-attack strategy helps your company's security engineers to evaluate the damage resulting from an attack, fix the system, document the experience, and get business functions running as rapidly as feasible.

Progent's expert information security engineers are available to assist your company to perform a comprehensive risk assessment and create a network security strategy to establish security policies and controls to reduce future attacks and threats.

CISM Accredited Security Engineering Assistance
The Certified Information Security Manager (CISM) committee describes the basic competencies and worldwide standards of performance that information security professionals are expected to master. CISM gives executive management the assurance that consultants who have qualified for their CISM credential possess the experience and knowledge to provide efficient security management and consulting consulting. Progent can provide the services of CISM certified security consultants to assist businesses with:

  • Network Security Governance
  • Risk Analysis
  • Network Security Implementation Management
  • Network Security Administration
  • Response Management
Find out more details concerning Progent's CISM Accredited Information Security Support Expertise.

CISSP Accredited Security Engineering Support
CISSP recognizes expertise with a global standard for information security. The American National Standards Institute has awarded the CISSP credential recognition in the area of data security under ISO 17024. Progent offers access to of security consultants who have qualified for CISSP certification. Progent can provide a CISSP-certified consultant to help your business in a broad range of security fields including:

  • Security Administration Practices
  • Security Architecture and Paradigms
  • Access Control Systems and Processes
  • Software Development Security
  • Operations Security
  • Site Security
  • Encryption/Decryption Mechanisms
  • Telecommunications, LAN and WAN Security
  • Disaster Recovery Preparedness
Find out additional information about Progent's CISSP-certified Information Security Consulting Professionals.

ISSAP Qualified Secure System Architecture Consulting Assistance
Progent's ISSAP certified information system architecture engineers are consultants who have been awarded ISSAP Certification through rigorous testing and extensive work with network security design. The ISSAP credential represents proven skill in the most in-depth demands of information system security architecture within the wider field of information system security knowledge needed for CISSP certification. Progent's ISSAP-certified security experts can assist your business with all aspects of architecture security including.

  • Access Control Mechanisms and Techniques
  • Phone System and Network Security
  • Encryption/Decryption Solutions
  • Requirements Analysis and Security Guidelines
  • BCP and Disaster Recovery Planning
  • Physical Security
Learn more information concerning Progent's ISSAP Accredited Secure System Architecture Consulting Professionals.

CISA Qualified Security Auditing Consulting Assistance
The Certified Information Systems Auditor (CISA) accreditation is a globally recognized qualification that indicates mastery in network security auditing. Accredited by the American National Standards Institute, the CISA accreditation has consultants pass an extensive examination administered by the ISACA international professional association. Progent's CISA-qualified IS security audit engineers are available to assist your business in the areas of:

  • IS Audit Services
  • IT Governance
  • Systems and Architecture Lifecycle Planning
  • IT Support
  • Safeguarding Information Assets
  • Disaster Recovery Preparedness
Learn additional details about Progent's CISA Qualified Network Security Auditing Engineering Services.

Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA to verify an IT professional's ability to plan, deploy, and support information system controls to mitigate risk. Progent can provide the services of a CRISC-certified consultant to help you to create and execute a business continuity strategy based on leading practices promoted by CRISC and crafted to align with your organization's risk tolerance, business objectives, and IT budget. Progent's CRISC-qualified IT risk mitigation engineers offer a range of risk identification services such as:

  • Collect information and study documentation to evaluate significant risk scenarios
  • Identify statutory, industry, and contractual mandates and company policies associated with your information system to determine their possible impact on your strategic goals
  • Point out possible threats for your business processes to help in evaluating your corporate risk
  • Create a risk awareness program and provide seminars to ensure your stakeholders understand IT risk so they can assist with your risk control process
  • Match identified risk scenarios to your associated operational procedures to help determine risk responsibility
  • Validate risk tolerance with your senior management and major stakeholders to make sure they are in agreement
Learn the details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Qualified Security Consulting Expertise
GIAC (Global Information Assurance Certification) was established in 1999 to validate the skill of IT security professionals. GIAC's goal is to assure that an accredited security consultant possesses the knowledge necessary to deliver services in vital areas of system, data, and software security. GIAC accreditations are recognized by businesses and institutions around the world including and the United States National Security Agency. Progent's GIAC-qualified network security audit consultants can help your IT organization in the areas of:

Find out additional details about Progent's GIAC Information Assurance Services.

Talk to a Certified Security Engineer
To see how to access a Progent security engineer for online or on-premises help in Oklahoma, call 1-800-993-9400 or go to Online Network Help.

© 2002- 2018 Progent Corporation. All rights reserved.