Company IT networks in the state of Texas can now get fast and affordable remote access to Progent's accredited security support specialists to assist with urgent security problems. Rates are affordable, billing is per minute, engagement is quick, and support is unbeatable. Progent also offers assistance for long-term engagements that requires the expertise of senior security consultants with top industry credentials.

In case your Texas company is based far from more populated urban neighborhoods such as Houston, San Antonio, Dallas, Austin, Fort Worth, or El Paso, support from local certified security professionals could be problematic when there's a crisis. This can result in a loss of income for your business, angry customers, unproductive employees, and distracted management. By calling Progent's remote support, you can get in touch with a qualified security engineer who can offer help whenever you require it to get your information system running and recover your data.

Progent can help you in your initiatives to protect your information system with services that can range from network security assessments to developing a comprehensive security strategy. Progent provides economical support to assist small and midsize companies to design and maintain safe IT environments based on Microsoft Windows and Cisco technology and that can include servers and desktops based on UNIX or Linux platforms plus BYOD users with Apple handhelds or Google Android or Windows Phone handsets.

Progent can also assist you to outsource spam blocking and protection from e-mail-based attacks. Email Guard is Progent's email filtering and encryption platform that uses the services and infrastructure of top data security vendors to deliver centralized management and comprehensive protection for all your inbound and outbound email. The hybrid structure of Progent's Email Guard integrates a Cloud Protection Layer with a local gateway device to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The Cloud Protection Layer serves as a first line of defense and keeps most unwanted email from reaching your network firewall. This reduces your exposure to external attacks and saves network bandwidth and storage space. Email Guard's on-premises gateway appliance adds a further level of inspection for inbound email. For outgoing email, the on-premises gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The on-premises security gateway can also assist Microsoft Exchange Server to track and safeguard internal email that originates and ends inside your security perimeter.

Progent's certified experts are available remotely or on site to provide a range of urgent or longer-term computer security services including:

  • Run extensive security evaluations
  • Clean up quickly after virus and worm attacks
  • Install firewalls from multiple vendors
  • Configure secure methods for remote and mobile connectivity
  • Install effective utilities for automatic protection against spam and directory harvest attacks
  • Help create a comprehensive security strategy with 24x7 security monitoring
  • Offer outsourced Call Center Support
  • Develop an effective network backup and restore plan built around Data Protection Manager technology
If your network has an urgent need for computer security support, go to Progent's Urgent Remote Network Support.

Progent's engineers provide world-class support in key facets of system security that include security evaluation, firewall and VPN expertise, and advanced security consulting.

Security Assessment
Progent's certified security consultants can evaluate the strength of your existing network protection environment by performing exhaustive remote automated testing via advanced utilities and tested techniques. Progent's skill in administering this testing saves you consulting fees and assures an objective portrayal of system vulnerability. The knowledge your business gains can be used as the basis of a network protection strategy that can permit your information system to run safely and respond quickly to future risks.

Automated Vulnerability Assessment
Progent offers consulting in the application of security auditing products such as MBSA and GFI LANguard for affordably performing a variety of programmed system testing scans to uncover potential security problems. Progent has extensive knowledge of other network auditing products including NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, as well as tools like Metasploit, Hydra, and Nikto. Progent can help you to make sense of audit reports and react appropriately.

Progent can help you build security into your company operations, install auditing software, define and implement a secure system architecture, and suggest procedures to maximize the safety of your network. Progent's security professionals are available to assist you to set up a firewall, design secure remote access to email and data, and integrate VPN. Find out additional information about Progent's network security assessment.

Security Inventory Packages for Small Businesses
Progent has put together two low-cost security inventory scanning bundles intended to enable small businesses to receive an independent security assessment from an accredited security specialist. With Progent's External Security Inventory Scan, an engineer administers an extensive examination of your network from outside your company firewall to uncover potential risks in the security profile you present to the outside world. With Progent's Internal Network Security Inventory Scan, a security expert executes a network scan from an authorized machine inside your firewall to uncover your exposure to inside attacks. The two security inventory services are set up and run from a secured remote site. The project is managed by an engineer who has earned top security credentials and who generates a report that details and analyzes the data collected by the security scan and suggests practical improvements if called for.

Network Intrusion Testing Consulting
Stealth intrusion testing is an important component of any successful network security strategy. Progentís security professionals can run thorough penetration tests without the knowledge of your organization's internal network support staff. Stealth penetration testing uncovers whether existing security monitoring systems such as intrusion incident alerts and event log analysis are properly configured and actively checked. Learn additional information concerning Progent's network security penetration analysis consulting.

Firewall and Virtual Private Network Expertise
Progent's expertise in security technology includes extensive field work with leading firewalls and VPN technology from multiple vendors such as Cisco, Microsoft, and Juniper. Progent can provide the support of engineers who have earned important networking accreditations such as Cisco Certified Internetwork Expert and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Configuration and Debugging
The latest generation of ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide significantly more performance than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new deployments. After Cisco's purchase of Sourcefire, the entire family of ASA 5500-X devices can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system (IPS). Firepower services bring powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can help you to manage your existing PIX or ASA 5500 security appliances or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your organization to design, configure, optimize, manage and troubleshoot firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Learn additional details about Cisco ASA 5500-X Firewalls with Firepower integration and troubleshooting services.

Cisco Security and VPN Consulting Services
Cisco's network security and remote connection technology represent a complete range of manageable security solutions to help protect your wired and wireless information system. Cisco's Virtual Private Network line features switches, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's expert consulting staff includes experienced engineers with Cisco's Certified Internetwork Expert and CCNP qualifications who are able to help your company to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that fit best with your business goals. Read additional details concerning Progent's Engineering Expertise for Cisco Security and VPN Appliances.

Engineering Services for Other Firewall and VPN Solutions
Progent offers small and medium size companies expert consulting for Intrusion Protection Systems and IPsec VPN products from leading firewall and Virtual Private Network security companies including WatchGuard, Juniper, and SonicWALL. Progent can show you how to design a comprehensive security strategy and select appropriate technologies from multiple suppliers to support your security objectives while sticking within your budget restraints.

Certified Security Planning
Any business should develop a carefully considered security program that incorporates both proactive procedures and response planning. The proactive strategy is a collection of procedures that help to minimize vulnerabilities. The post-attack plan assists your IT security engineers to assess the impact caused by an attack, repair the system, document the experience, and get business functions running as soon as possible.

Progent's certified information security consultants are available to help your company to run a complete vulnerability evaluation and define a company-wide security strategy to establish security processes and controls to minimize ongoing assaults and threats.

CISM Certified System Security Support Expertise
The Certified Information Security Manager (CISM) committee defines the basic competencies and worldwide standards of performance that information security managers are required to learn. It provides business management the assurance that those who have qualified for their CISM credential have the experience and capability to provide efficient security administration and consulting services. Progent offers the expertise of CISM certified security consultants to assist companies with:

  • Information Security Governance
  • Risk Management
  • IS Security Implementation Management
  • Network Security Administration
  • Response Planning
Learn more information concerning Progent's CISM Qualified IS Security Consulting Services.

CISSP Qualified Security Engineering Support
CISSP recognizes expertise with a global standard for network security. The American National Standards Institute has awarded certification accreditation in the field of data security under ISO/IEC 17024. Progent offers access to of security professionals who have earned CISSP accreditation. Progent can give you access to a CISSP-certified professional to help your company in a variety security fields such as:

  • Security Administration Procedures
  • Security Architecture and Models
  • Access Control Solutions and Methodology
  • Applications Development Security
  • Operations Security
  • Site Security
  • Data Encryption Mechanisms
  • Telecommunications, LAN and Internet Security
  • Disaster Recovery Preparedness
Learn more information about Progent's CISSP Qualified Security Engineering Expertise.

ISSAP Qualified Secure IT Architecture Consulting Support
Progent's ISSAP qualified system architecture engineers are experts who have been awarded ISSAP Certification as a result of rigorous examination and significant work with network security design. The Information System Security Architecture Professional (ISSAP) credential represents demonstrated mastery in the more challenging demands of information security architecture within the broader field of information security expertise needed for CISSP accreditation. Progent's ISSAP-certified security experts can assist your company with all phases of secure network architecture including.

  • Access Control Systems and Methodologies
  • Telecom and Network Protection
  • Data Encryption Options
  • Requirements Analysis and Security Guidelines
  • Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
  • Site Security
Find out more information concerning Progent's ISSAP Accredited Secure Network Architecture Support Services.

CISA Certified Security Auditing Consulting Support
The CISA credential is a recognized achievement that signifies mastery in network security audit and control. Certified by the American National Standards Institute, the CISA accreditation has consultants pass an extensive test administered by the ISACA professional group. Progent's CISA-certified security audit specialists can assist your business with:

  • Information Systems Audit Process
  • IT Administration
  • Systems and Infrastructure Lifecycle Planning
  • Information Technology Service Delivery
  • Safeguarding Information Resources
  • Business Continuity Preparedness
Get additional details about Progent's CISA Accredited Information System Security Auditing Engineering Services.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC certification program was initiated by ISACA in 2010 to verify an IT professional's ability to plan, implement, and support IS controls to reduce network risk. Progent can provide the expertise of a CRISC-certified consultant to assist your company to create and execute a workplace continuity or disaster recovery strategy based on industry best practices identified by CRISC and geared to align with your company's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC network risk mitigation engineers can provide a range of risk identification services including:

  • Collect information and study documentation to identify major risk scenarios
  • Identify legal, industry, and business mandates and company standards associated with your information system to assess their potential impact on your business goals
  • Identify possible vulnerabilities for your business workflows to help in evaluating your corporate risk
  • Develop a risk awareness initiative and conduct seminars to ensure your organization understand information system risk so they can contribute to your risk control process
  • Connect key risk vectors to your associated business processes to help assign risk responsibility
  • Validate risk appetite with your senior management and major stakeholders to ensure they align
Find out more details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Accredited Network Security Engineering Services
GIAC was established in 1999 to validate the skill of IT security professionals. GIAC's goal is to ensure that a certified security consultant has the skills needed to provide services in critical areas of network, information, and application security. GIAC accreditations are recognized by businesses and government organizations around the world including and the U.S. NSA. Progent's GIAC-certified network security audit experts are available to help your IT organization with:

Find out additional details about Progent's GIAC Information Assurance Services.

Talk to a Progent Security Specialist
To find out how to get in touch with a certified Progent security engineer for online or on-premises help in Texas, phone 1-800-993-9400 or go to Online Computer Support.














© 2002- 2017 Progent Corporation. All rights reserved.