Company computer networks in Oklahoma now have quick and affordable remote technical support from Progent's qualified network security engineers to fix critical security issues. Rates are reasonable, billing is per minute, engagement is immediate, and support is unbeatable. Progent also offers assistance for complex projects that requires the knowledge of seasoned security consultants with top industry certifications.

In case your Oklahoma business is based far from larger urban neighborhoods like Oklahoma City, Tulsa, Norman, or Lawton, access to nearby certified network security consultants could be problematic during a security disaster. This can cause a drop in productivity for your company, angry customers, unproductive employees, and distracted management. By calling Progent's online services, you can get in touch with a certified security professional who can provide expertise whenever you require it to get your network running and recover your data.

Progent can assist you at any level in your initiatives to guard your IT environment with support services that ranges from security checks to developing a comprehensive security strategy. Progent offers affordable support to help small and midsize companies to set up and maintain protected networks powered by Windows and Cisco technology and that can include computers based on UNIX, Linux, Sun Solaris, or Mac OS X platforms plus BYOD users with Apple handhelds or Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam filtering and defense against email-borne assaults. Email Guard is Progent's email filtering and encryption solution that uses the technology of top information security companies to provide centralized control and world-class protection for your inbound and outbound email. The powerful structure of Email Guard managed service combines cloud-based filtering with an on-premises gateway device to offer advanced defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-based malware. The Cloud Protection Layer acts as a first line of defense and keeps most threats from reaching your security perimeter. This decreases your exposure to inbound attacks and conserves network bandwidth and storage space. Email Guard's on-premises security gateway appliance adds a deeper level of inspection for inbound email. For outbound email, the onsite gateway provides AV and anti-spam filtering, protection against data leaks, and email encryption. The on-premises security gateway can also assist Exchange Server to track and safeguard internal email that stays inside your security perimeter.

Progent's certified professionals are available online or in person to provide a variety of urgent or longer-term network security services which include:

  • Perform extensive network security evaluations
  • Recover rapidly after virus and worm attacks
  • Set up effective firewalls
  • Configure safe techniques for offsite and mobile access
  • Install effective utilities for automatic protection against viruses, spam and DHAs
  • Develop a company-wide security strategy with proactive security monitoring
  • Provide comprehensive Call Center Services
  • Create a practical network backup and business continuity plan based on Microsoft DPM automated backup technology
If your company has an emergency need for computer security help, go to Progent's Emergency Remote Network Help.

Progent's support professionals provide advanced services in vital areas of computer security including security evaluation, firewall and VPN expertise, and high-level security consulting.

Security Audits
Progent's expert security engineers can assess the vulnerability of your existing computer security environment by performing exhaustive remote automated analysis via advanced software tools and proven techniques. Progent's skill in administering this testing saves you money and offers an accurate picture of security holes. The information your IT organization is provided can form the basis of a security plan that will allow your network to operate safely and respond quickly to new threats.

Automated Security Audits
Progent provides consulting in the use of security evaluation packages such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard Network Security Scanner for affordably performing a variety of automatic system testing checks to identify potential security gaps. Progent has broad experience with other network analysis utilities such as NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, plus utilities such as SolarWinds, Netcat, Hydra, and Nikto. Progent can show you how to make sense of audit reports and react appropriately.

Progent can show you how to build security into your business operations, configure scanning applications, plan and implement a secure system architecture, and recommend procedures to maximize the safety of your IT system. Progent's security consultants are able to assist you to configure a firewall, implement secure remote access to email and data, and install virtual private network. Find out additional information about Progent's automated security assessment.

Security Inventory Packages for Small Companies
Progent offers two ultra-affordable security inventory and evaluation packages intended to enable small companies to get an impartial network security evaluation from a qualified security engineer. With Progent's External Security Inventory Checkup, a security engineer administers a comprehensive examination of your IT infrastructure from beyond your firewall to uncover potential risks in the security posture you present to the outside world. With Progent's Internal Network Security Inventory Checkup, a security expert runs a network scan from an authorized machine within your company firewall to evaluate your exposure to internal attacks. Both security inventory packages are configured and run from a protected remote site. The project is directed by a consultant with high-level security credentials and who generates a report that details and interprets the data collected by the security scan and proposes practical remediation where called for.

Stealth Penetration Testing Consulting
Stealth penetration checking is an important part of any serious network security strategy. Progentís security professionals can run extensive penetration checks without the awareness of your organization's internal IT staff. Unannounced penetration testing uncovers whether existing security defense tools such as intrusion incident warnings and event log analysis are correctly configured and consistently monitored. Find out more on Progent's network penetration testing consulting.

Firewall and Virtual Private Network Expertise
Progent's background in security technology encompasses in-depth familiarity with major firewalls and Virtual Private Network products offered by multiple companies including Cisco, Microsoft, and Symantec. Progent can provide the support of engineers with important industry certifications including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Configuration and Troubleshooting
The latest generation of Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer substantially more bang for the buck than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX security appliances for all new deployments. Following Cisco's purchase of Sourcefire, the entire family of ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the market's most deployed intrusion protection system (IPS). Firepower services bring powerful new features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can assist your company to manage your current PIX or Cisco ASA 5500 firewalls or migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can help your business to plan, configure, tune, administer and troubleshoot firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Learn more details about Cisco ASA 5500-X Firewalls with Firepower integration and troubleshooting services.

Cisco Network Security and Virtual Private Network Consulting Expertise
Cisco's security and remote connection technology provide a complete line of easy-to-administer security solutions to help protect your wired and wireless information system. Cisco's Virtual Private Network product family features routers, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's expert consulting staff includes experienced engineers with Cisco Certified Internetwork Expert and CCNP qualifications who are able to assist your business to select Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that align most closely with your company goals. Read additional details about Progent's Engineering Services for Cisco Security Technology and VPN Appliances.

Consulting Services for Additional Firewall and VPN Technology
Progent provides small and medium size organizations professional support for Intrusion Protection Systems and IPsec VPN products from major firewall and Virtual Private Network security companies including WatchGuard, Juniper Networks, and SonicWALL. Progent can show you how to design a detailed security strategy and choose the right products from a variety of suppliers to achieve your security goals while staying within your spending limits.

Certified Security Design
Any company should have a carefully thought out security program that includes both proactive processes and reaction plans. The pre-attack strategy is a set of steps intended to reduce vulnerabilities. The post-attack plan assists your IT security personnel to evaluate the impact caused by a security penetration, repair the damage, record the experience, and get the IT network running as quickly as feasible.

Progent's certified information security engineers are available to assist your business to run a complete risk assessment and define a network security plan to establish security policies and controls to minimize ongoing assaults and threats.

CISM Qualified Network Security Support Services
The CISM committee describes the basic capabilities and international standards of skill that information security managers are required to learn. CISM gives executive management the assurance that those who have earned their CISM credential possess the background and knowledge to deliver efficient security management and consulting consulting. Progent can provide the expertise of CISM qualified security professionals to assist businesses with:

  • Network Security Processes
  • Risk Analysis
  • IS Security Program Management
  • IS Security Management
  • Recovery Planning
Read more information about Progent's CISM IS Security Consulting Services.

CISSP Accredited Security Consulting Support
CISSP recognizes mastery of an international standard for data security. The American National Standards Institute has awarded the CISSP credential accreditation in the area of information protection stipulated by ISO/IEC 17024. Progent offers the services of security consultants who have qualified for CISSP accreditation. Progent can provide a CISSP-certified professional to help your enterprise in a broad range of security fields such as:

  • Security Administration Practices
  • Security Infrastructure and Paradigms
  • Access Management Solutions and Processes
  • Applications Development Security
  • Secure Operations
  • Site Security
  • Data Encryption Mechanisms
  • Telecommunications, LAN and Internet Security
  • Business Continuity Planning
Learn additional details concerning Progent's CISSP-certified Network Security Support Expertise.

ISSAP Certified Secure Information System Architecture Engineering Support
Progent's ISSAP qualified system architecture engineers are consultants who have earned ISSAP Certification through rigorous testing and significant experience with network security design. The Information System Security Architecture Professional (ISSAP) certification represents demonstrated skill in the more complex requirements of information system security architecture bounded by the wider field of information security expertise needed for CISSP accreditation. Progent's ISSAP-certified security consultants can help your company with all aspects of secure network architecture such as.

  • Access Management Mechanisms and Methodologies
  • Telecommunications and System Infrastructure Protection
  • Data Encryption Solutions
  • Requirements Evaluation and Security Standards
  • Business Continuity Planning and DRP
  • Hardware Security
Find out more information about Progent's ISSAP Accredited Secure System Architecture Consulting Professionals.

CISA Accredited Information System Security Auditing Consulting Support
The Certified Information Systems Auditor (CISA) credential is a recognized qualification that indicates mastery in IS security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA accreditation has candidates pass a comprehensive test administered by the ISACA international professional group. Progent's CISA-certified information security audit consultants can help your company in the areas of:

  • Information Systems Audit Process
  • IT Governance
  • Systems and Architecture Planned Useful Life
  • Information Technology Service Delivery
  • Protecting Data Assets
  • Disaster Recovery Preparedness
Find out additional information about Progent's CISA Qualified IS Security Auditing Consulting Services.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC certification program was established by ISACA to verify a consultant's ability to plan, deploy, and support IS controls to reduce risk. Progent offers the expertise of a CRISC-certified engineer to assist your company to develop and execute a business continuity plan based on industry best practices promoted by CRISC and crafted to match your organization's risk appetite, business objectives, and IT budget. Progent's CRISC-certified IT risk management engineers offer a range of risk assessment services including:

  • Collect data and review documentation to help identify major vulnerabilities
  • Inventory statutory, industry, and contractual requirements and company standards associated with your information system to assess their potential impact on your business objectives
  • Identify possible vulnerabilities for your operational processes to help in analyzing your enterprise risk
  • Develop a risk awareness initiative and provide seminars to ensure your organization understand IT risk so they can contribute to your risk management program
  • Connect identified risk scenarios to your associated business procedures to help assign risk ownership
  • Validate risk tolerance with your senior management and major stakeholders to make sure they align
Find out more details concerning Progent's CRISC Experts.

GIAC Accredited IS Security Engineering Expertise
Global Information Assurance Certification was founded in 1999 to validate the knowledge of information technology security engineers. GIAC's mission is to verify that a certified security consultant possesses the skills appropriate to deliver support in important areas of system, data, and software security. GIAC certifications are acknowledged by businesses and institutions throughout the world including and the United States NSA. Progent's GIAC security audit experts can help your company in the areas of:

Read additional information concerning Progent's GIAC Information Assurance Support.

Contact a Certified Progent Security Engineer
To find out how you can get in touch with a certified security engineer for remote or on-premises support in Oklahoma, call 1-800-993-9400 or go to Remote Computer Help.

© 2002- 2017 Progent Corporation. All rights reserved.