Business computer networks in the state of Texas can have quick and economical online access to Progent's accredited security engineers to assist with the toughest security issues. Rates are reasonable, charges are per minute, sign-up is quick, and support is unbeatable. Progent also provides assistance for complex engagements that demand the expertise of senior security consultants with high-level industry credentials.

In case your Texas company is located outside of more populated urban areas such as Houston, San Antonio, Dallas, Austin, Fort Worth, or El Paso, help from local certified security experts may be limited during an urgent situation. This can cause lost productivity for your business, angry customers, idle employees, and defocused management. By utilizing Progent's online services, you can get in touch with a qualified security consultant ready to offer help when you need it to get your network running and recover your information.

Progent can help you at any level in your efforts to defend your IT environment with services that can range from security audits to developing a comprehensive security strategy. Progent provides affordable service to assist companies of any size to design and manage secure IT environments powered by Microsoft Windows and Cisco products and that may include computers running UNIX or Linux operating systems plus BYOD users with Apple iOS iPhones and iPads or Android or Windows Phone smart phones and tablets.

Progent can also show you how to outsource spam filtering and defense against email-borne security threats. Email Guard is Progent's email security solution that uses the services and infrastructure of leading information security companies to deliver centralized management and comprehensive security for all your inbound and outbound email. The hybrid structure of Progent's Email Guard integrates cloud-based filtering with a local gateway appliance to provide complete defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne malware. ProSight Email Guard's Cloud Protection Layer acts as a preliminary barricade and blocks most threats from making it to your network firewall. This decreases your vulnerability to external threats and saves network bandwidth and storage space. ProSight Email Guard's onsite security gateway device provides a deeper level of analysis for inbound email. For outbound email, the on-premises security gateway provides anti-virus and anti-spam protection, protection against data leaks, and email encryption. The local security gateway can also help Exchange Server to track and protect internal email traffic that originates and ends inside your corporate firewall.

Progent's certified professionals are accessible remotely or on premises to offer a variety of urgent or longer-term computer security services including:

  • Run automated security evaluations
  • Recover quickly after virus and worm attacks
  • Configure and troubleshoot firewalls
  • Implement secure methods for offsite and mobile connectivity
  • Install effective solutions for automatic defense against viruses, spam and DHAs
  • Develop a company-wide security plan with 24x7 monitoring
  • Provide outsourced Call Center Support
  • Develop a practical backup and disaster recovery plan centered on System Center Data Protection Manager backup/restore capability
If your business has an emergency need for IT security help, refer to Progent's Urgent Online Network Support.

Progent's consultants can deliver world-class support in vital areas of system security that include auditing, firewall and VPN expertise, and advanced security consulting.

System Security Assessment
Progent's certified security consultants can assess the effectiveness of your existing network security systems through exhaustive remote automated testing based on advanced utilities and tested techniques. Progent's skill in this service saves you time and money and assures an objective picture of weaknesses. The knowledge your company is provided can make up the foundation of a network protection strategy that will permit your information system to operate dependably and react rapidly to new threats.

Automated Network Security Analysis
Progent offers consulting in the use of security analysis utilities including Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard NSS for economically running a set of programmed network testing scans to identify possible security vulnerabilities. Progent has extensive experience with other security analysis utilities such as NMAP, AMAP Application Scanner, eEye, as well as tools like Metasploit, Hydra, and Nikto. Progent can show you how to make sense of audit reports and respond appropriately.

Progent can show you how to design protection into your business operations, install auditing tools, plan and deploy a secure system architecture, and suggest policies to maximize the safety of your IT system. Progent's security professionals are ready to show you how to configure a firewall, design secure remote access to email and data, and integrate virtual private network. Learn more concerning Progent's network security assessment.

Security Inventory Scanning Packages for Small Businesses
Progent has put together two low-cost security inventory scanning packages designed to enable small companies to receive an independent security evaluation from a certified security specialist. With Progent's External Network Security Inventory Checkup, a security engineer administers an extensive examination of your IT infrastructure from outside your firewall to determine potential weaknesses in the security profile you present to the public. With Progent's Internal Security Inventory Scan, a security engineer runs a network scan from a secure machine inside your firewall to assess your exposure to internal assaults. The two security inventory packages are set up and executed from a protected external location. The process is managed by a consultant with high-level security credentials and who produces a document that details and interprets the information collected by the security scan and proposes practical improvements if appropriate.

Network Security Penetration Analysis Support Services
Stealth intrusion testing is an important part of any serious IT system security plan. Progentís security experts can perform thorough intrusion checks without the awareness of your company's internal IT staff. Stealth penetration checking shows whether existing security monitoring systems such as intrusion incident warnings and event log analysis are correctly set up and consistently monitored. Find out additional information concerning Progent's network penetration testing consulting.

Firewall/VPN Support
Progent's expertise in security technology includes in-depth field work with leading firewalls and Virtual Private Network (VPN) products offered by multiple vendors including Cisco, Microsoft, and CheckPoint. Progent can provide the services of consultants who have earned important industry certifications including Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Integration and Troubleshooting
The latest generation of Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer substantially more performance than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX security appliances for new deployments. After Cisco's purchase of Sourcefire, the entire family of ASA 5500-X devices can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system (IPS). Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can help you to maintain your legacy PIX or Cisco ASA 5500 security appliances and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist you to plan, integrate, optimize, manage and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about Cisco ASA 5500-X Firewalls with Firepower configuration and troubleshooting services.

Cisco Security and VPN Support Expertise
Cisco's security and offsite access technology represent a full line of easy-to-administer security products to help protect your local and remote information system. Cisco's Virtual Private Network line features switches, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's professional staff of consultants includes field-proven engineers with Cisco Certified Internetwork Expert and CCNP certifications who can help your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that fit best with your company objectives. Read more information concerning Progent's Consulting Services for Cisco Security Solutions and VPN Products.

Engineering Services for Additional Firewall and Virtual Private Network Products
Progent offers small and medium size organizations professional consulting for Intrusion Protection products and IPsec VPN technology from leading firewall and VPN security vendors including WatchGuard, Juniper, and SonicWALL. Progent can show you how to create a detailed security plan and choose the right products from multiple vendors to support your security objectives while staying within your spending limits.

Progent's Flat-rate Managed Services for Information Assurance
Progent offers a portfolio of low-cost, fixed-price monthly services intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services offered by Progent include:
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email security solution that uses the technology of top data security companies to provide web-based management and comprehensive protection for your email traffic. The powerful architecture of Email Guard combines cloud-based filtering with an on-premises gateway device to offer complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based threats. ProSight Email Guard's cloud filter acts as a first line of defense and blocks most threats from reaching your security perimeter. This reduces your exposure to inbound attacks and conserves network bandwidth and storage. ProSight Email Guard's on-premises gateway device provides a deeper level of inspection for incoming email. For outgoing email, the on-premises gateway offers anti-virus and anti-spam protection, protection against data leaks, and email encryption. The local gateway can also assist Microsoft Exchange Server to track and safeguard internal email that stays within your corporate firewall. Find out more about Progent's ProSight Email Guard Spam Filtering, Virus Defense, Content Filtering and Data Loss Protection.

ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates next generation behavior machine learning technology to guard endpoints as well as servers and VMs against modern malware attacks like ransomware and email phishing, which easily escape legacy signature-based anti-virus tools. ProSight ASM protects local and cloud-based resources and provides a unified platform to automate the complete malware attack progression including protection, detection, mitigation, remediation, and post-attack forensics. Top capabilities include one-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) Next-Generation Endpoint Protection and Ransomware Defense.

ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services offer small and medium-sized organizations a low cost end-to-end service for secure backup/disaster recovery. Available at a fixed monthly price, ProSight DPS automates and monitors your backup processes and allows rapid restoration of vital data, applications and VMs that have become lost or damaged due to component failures, software bugs, natural disasters, human error, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images, as well as Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to an on-promises storage device, or to both. Progent's BDR consultants can deliver world-class support to set up ProSight DPS to to comply with government and industry regulatory standards like HIPPA, FIRPA, and PCI and, whenever necessary, can help you to restore your critical data. Find out more about ProSight Data Protection Services Managed Cloud Backup and Recovery.

Certified Network Security Planning
Any business ought to have a carefully considered security program that incorporates both pre-attack processes and response planning. The pre-attack plan is a collection of mechanisms that help to reduce vulnerabilities. The reactive strategy helps your company's security personnel to evaluate the impact resulting from an attack, repair the damage, document the event, and get the IT network operational as quickly as possible.

Progent's expert information security engineers are available to assist you to run a complete vulnerability assessment and create a computer security strategy to implement security policies and controls to minimize future assaults and dangers.

CISM Certified Network Security Engineering Assistance
The CISM organization describes the core competencies and global standards of performance that information security managers are required to master. It gives business management the assurance that those who have qualified for their CISM certification possess the experience and knowledge to provide efficient security administration and consulting consulting. Progent offers the support of CISM qualified security consultants to help companies with:

  • Information Security Governance
  • Vulnerability Management
  • Network Security Implementation Management
  • Network Security Administration
  • Response Management
Find out more details about Progent's CISM Qualified IS Security Engineering Expertise.

CISSP Qualified Security Consulting Services
CISSP certification recognizes expertise with a worldwide standard for network security. ANSI (American National Standards Institute) has granted certification accreditation in the area of information security stipulated by ISO/IEC 17024. Progent can provide the services of security experts who have qualified for CISSP certification. Progent can give you access to a CISSP-certified expert to help your organization in a broad range of security areas including:

  • Security Management Practices
  • Security Architecture and Models
  • Access Control Solutions and Methodology
  • Software Development Security
  • Operations Security
  • Site Security
  • Cryptography Mechanisms
  • Telecom, LAN and WAN Security
  • Disaster Recovery Preparedness
Learn more information about Progent's CISSP Information Security Consulting Services.

ISSAP Accredited Secure Network Architecture Engineering Support
Progent's ISSAP certified network architecture engineers are experts who have earned ISSAP Certification as a result of thorough examination and extensive experience with information security design. The ISSAP certification represents proven skill in the more challenging demands of IS security architecture bounded by the wider field of information system security expertise needed for CISSP certification. Progent's ISSAP-certified security specialists can assist your business with all phases of secure network architecture such as.

  • Access Control Mechanisms and Techniques
  • Telecommunications and Network Infrastructure Protection
  • Encryption/Decryption Solutions
  • Needs Evaluation and Security Guidelines
  • BCP and DRP
  • Physical Security
Read more information concerning Progent's ISSAP Qualified Secure System Architecture Consulting Expertise.

CISA Accredited Information System Security Auditing Engineering Services
The CISA credential is a recognized achievement that represents expertise in network security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA credential has candidates pass a comprehensive examination administered by the ISACA professional group. Progent's CISA security audit experts are available to help your business with:

  • IS Audit Services
  • Information Technology Governance
  • Network Assets and Infrastructure Planned Useful Life
  • IT Service Delivery
  • Safeguarding Information Assets
  • Disaster Recovery Planning
Get the details about Progent's CISA Certified Network Security Auditing Consulting Expertise.

CRISC Experts
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA in 2010 to verify an IT professional's ability to plan, implement, and support IS controls to mitigate network risk. Progent offers the services of a CRISC-certified consultant to help your company to develop and carry out a business continuity or disaster recovery strategy based on industry best practices identified by CRISC and geared to match your company's risk tolerance, business objectives, and IT budget. Progent's CRISC network risk mitigation consultants can provide a variety of risk assessment services such as:

  • Collect data and review documentation to evaluate major vulnerabilities
  • Identify statutory, regulatory, and contractual requirements and organizational policies related to your network to determine their potential influence on your business objectives
  • Point out possible vulnerabilities for your operational workflows to assist in evaluating your corporate risk
  • Create a risk awareness program and provide seminars to ensure your organization understand IS risk so they can contribute to your risk management process
  • Connect key risk vectors to related operational procedures to help assign risk responsibility
  • Determine risk appetite with executive management and major stakeholders to make sure they match
Read additional details about Progent's CRISC Experts.

GIAC Certified Network Security Engineering Assistance
GIAC was established in 1999 to certify the knowledge of computer security engineers. GIAC's mission is to ensure that an accredited security consultant has the knowledge necessary to deliver support in key areas of system, information, and program security. GIAC certifications are acknowledged by companies and government organizations throughout the world including and the U.S. National Security Agency. Progent's GIAC-certified security audit consultants can help your company with:

  • Assessing IT Infrastructure
  • Security Incident Response
  • Intrusion Detection
  • Web Services Security
  • SIEM solutions
Find out additional information concerning Progent's GIAC Information Assurance Services.

Contact a Progent Security Specialist
To find out how to get in touch with a certified Progent security engineer for remote or on-premises expertise in Texas, call 1-800-993-9400 or go to Online Network Support.

© 2002- 2018 Progent Corporation. All rights reserved.