Business information networks in the state of Texas can depend on fast and economical remote access to Progent's qualified security experts to fix the toughest security issues. The cost is competitive, billing is by the minute, engagement is quick, and service is world class. Progent also offers assistance for complex projects that demand the services of senior security consultants with high-level industry certifications.

If your Texas company is situated outside of more populated urban neighborhoods such as Houston, San Antonio, Dallas, Austin, Fort Worth, or El Paso, the availability of local accredited network security engineers may be limited when there's a crisis. This could mean lost productivity for your company, angry clients, unproductive workers, and defocused executives. By calling Progent, you can get in touch with a qualified security engineer who can offer expertise when you have to have it to keep your system on line and recover your information.

Progent can assist you in a variety of ways in your initiatives to protect your network with services that ranges from security assessments to developing a comprehensive security plan. Progent offers affordable support to assist businesses of all sizes to design and maintain secure IT environments powered by Microsoft Windows and Cisco technology and that can include servers and desktops running UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as mobile clients with Apple iOS iPhones and iPads or Google Android or Windows Phone handsets.

Progent can also assist you to outsource spam blocking and protection from email-borne attacks. Email Guard is Progent's email filtering and encryption platform that incorporates the technology of top information security vendors to provide web-based management and comprehensive protection for your inbound and outbound email. The hybrid architecture of Progent's Email Guard integrates a Cloud Protection Layer with a local gateway appliance to offer complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. ProSight Email Guard's cloud filter serves as a first line of defense and blocks most unwanted email from making it to your network firewall. This decreases your vulnerability to external threats and saves network bandwidth and storage space. ProSight Email Guard's onsite gateway device provides a deeper level of analysis for incoming email. For outgoing email, the on-premises gateway offers anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The local gateway can also enable Exchange Server to track and safeguard internal email that stays within your security perimeter.

Progent's security experts are accessible remotely or on premises to offer a range of urgent or project-based network security services such as:

If your company has an immediate need for computer security support, refer to Progent's Urgent Remote Network Help.

Progent's consultants offer world-class support in key areas of computer security that include auditing, firewall and VPN expertise, and advanced security consulting.

Security Assessment
Progent's certified security consultants can evaluate the effectiveness of your current network security environment through exhaustive remote automated testing based on advanced utilities and tested procedures. Progent's experience in administering this service saves you time and money and offers an objective portrayal of gaps. The information your IT organization gains can make up the foundation of a network protection strategy that will allow your information system to run dependably and react quickly to new risks.

Automated Network Vulnerability Audits
Progent provides consulting in the use of security auditing packages including MBSA and GFI LANguard for economically performing a set of programmed network auditing scans to uncover possible security weaknesses. Progent has extensive experience with additional security analysis products including NMAP, AMAP Application Scanner, eEye Vulnerability Scanner, as well as tools like Metasploit Framework, Netcat, Socat, and Nikto. Progent can help you to understand testing reports and respond appropriately.

Progent can help you build protection into your company processes, configure auditing applications, define and deploy a secure network environment, and suggest procedures to optimize the safety of your IT system. Progent's security consultants are able to help you configure a firewall, implement secure remote access to email and data, and integrate VPN. Find out additional information on Progent's network security analysis.

Security Inventory and Evaluation Bundles for Small Companies
Progent offers two low-cost security inventory scanning bundles intended to allow small businesses to get an independent security assessment from a qualified security expert. With Progent's External Security Inventory Checkup, a security engineer runs a comprehensive examination of your IT infrastructure from outside your company firewall to determine potential weaknesses in the security profile you present to the public. With Progent's Internal Network Security Inventory Scan, a certified security professional runs a system scan from an authorized machine within your company firewall to assess vulnerabilities to internal threats. The two security inventory services are configured and executed from a protected remote site. The project is managed by an engineer with high-level security accreditations and who produces a report that summarizes and analyzes the information captured by the scan and proposes practical remediation if appropriate.

Network Penetration Analysis Support Services
Stealth intrusion checking is a key part of any serious network security strategy. Progent’s security professionals can perform thorough intrusion tests without the knowledge of your company's in-house network support resources. Unannounced penetration testing uncovers whether current security monitoring systems such as intrusion incident warnings and event history monitoring are properly configured and actively monitored. Learn more about Progent's stealth penetration testing consulting.

Firewalls and VPN Support
Progent's background in security solutions encompasses extensive familiarity with leading firewalls and Virtual Private Network technology from multiple vendors including Cisco, Microsoft, and Symantec. Progent can provide the support of consultants with key industry certifications including CCIE and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Integration and Troubleshooting
The latest generation of ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer significantly more performance than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX security appliances for new deployments. Since Cisco's purchase of Sourcefire, the whole family of Cisco ASA 5500-X devices can be provisioned to support Firepower Services, built on Sourcefire's Snort technology, which is the world's most deployed intrusion protection system. Firepower services bring powerful new features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network consultants can help your company to manage your legacy PIX or Cisco ASA 5500 firewalls and upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can help your organization to plan, configure, optimize, administer and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about ASA Firewalls with Firepower Services integration and debugging support.

Cisco Network Security and Virtual Private Network Consulting Expertise
Cisco's network security and remote access technology offer a full range of easy-to-administer security solutions to help safeguard your wired and wireless network infrastructure. Cisco's Virtual Private Network line includes switches, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's professional consulting staff includes experienced engineers with Cisco Certified Internetwork Expert and CCNP certifications who can help your company to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that align best with your company goals. Learn more details about Progent's Consulting Services for Cisco Security Technology and Virtual Private Network Products.

Support Services for Other Firewall and Virtual Private Network Solutions
Progent provides small and medium size organizations expert support for Intrusion Protection products and IPsec VPN solutions from major firewall and VPN security companies including Check Point Software, Juniper, and Symantec. Progent can show you how to create a detailed security plan and select appropriate technologies from a variety of vendors to achieve your security goals while sticking within your budget limits.

Progent's Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight line of outsourced network management services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) service that incorporates cutting edge behavior-based analysis technology to guard endpoint devices and servers and VMs against new malware assaults such as ransomware and file-less exploits, which routinely escape legacy signature-based anti-virus tools. ProSight ASM protects on-premises and cloud-based resources and provides a unified platform to automate the complete malware attack lifecycle including protection, detection, containment, remediation, and forensics. Key features include single-click rollback using Windows Volume Shadow Copy Service and real-time network-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
ProSight Enhanced Security Protection (ESP) services offer ultra-affordable in-depth protection for physical servers and virtual machines, workstations, smartphones, and Exchange Server. ProSight ESP utilizes adaptive security and modern behavior analysis for continuously monitoring and responding to security assaults from all vectors. ProSight ESP offers firewall protection, penetration alerts, endpoint control, and web filtering via leading-edge tools incorporated within one agent accessible from a unified control. Progent's security and virtualization consultants can assist you to plan and implement a ProSight ESP environment that addresses your company's unique requirements and that allows you achieve and demonstrate compliance with government and industry data security regulations. Progent will help you define and implement policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alerts that require immediate attention. Progent can also assist you to install and test a backup and restore solution such as ProSight Data Protection Services so you can recover quickly from a destructive security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Exchange email filtering.

ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services from Progent provide small and medium-sized businesses a low cost end-to-end service for secure backup/disaster recovery (BDR). Available at a low monthly price, ProSight DPS automates your backup processes and allows fast recovery of critical data, apps and virtual machines that have become lost or corrupted due to component breakdowns, software bugs, disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware images. Critical data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's cloud backup specialists can deliver world-class support to set up ProSight Data Protection Services to be compliant with regulatory requirements such as HIPPA, FINRA, and PCI and, whenever needed, can help you to recover your critical information. Find out more about ProSight Data Protection Services Managed Cloud Backup and Recovery.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering service that uses the technology of leading information security vendors to provide centralized management and comprehensive protection for your inbound and outbound email. The powerful structure of Progent's Email Guard combines a Cloud Protection Layer with an on-premises security gateway appliance to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The cloud filter serves as a preliminary barricade and blocks the vast majority of threats from making it to your security perimeter. This reduces your vulnerability to inbound threats and conserves network bandwidth and storage. Email Guard's on-premises security gateway device provides a further level of analysis for inbound email. For outbound email, the on-premises gateway offers anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The local security gateway can also assist Microsoft Exchange Server to track and protect internal email that originates and ends within your security perimeter. For more details, visit ProSight Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and apps hosted in a protected Tier III data center on a fast virtual host configured and maintained by Progent's network support experts. With the ProSight Virtual Hosting service model, the client retains ownership of the data, the OS platforms, and the applications. Because the system is virtualized, it can be ported immediately to a different hosting solution without requiring a time-consuming and technically risky configuration procedure. With ProSight Virtual Hosting, your business is not tied a single hosting service. Find out more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, update, retrieve and safeguard information about your network infrastructure, processes, business apps, and services. You can instantly locate passwords or IP addresses and be warned automatically about impending expirations of SSL certificates or warranties. By updating and managing your network documentation, you can eliminate as much as 50% of time thrown away searching for vital information about your IT network. ProSight IT Asset Management includes a centralized location for storing and sharing all documents related to managing your business network such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports advanced automation for gathering and associating IT data. Whether you’re planning enhancements, doing regular maintenance, or responding to a crisis, ProSight IT Asset Management delivers the information you need as soon as you need it. Find out more details about ProSight IT Asset Management service.

Expert Security Consulting
Any business ought to have a carefully thought out security program that includes both preventive processes and response planning. The proactive strategy is a set of mechanisms designed to minimize vulnerabilities. The reactive plan assists your security personnel to assess the damage resulting from a security penetration, fix the network, document the event, and get the IT network operational as rapidly as possible.

Progent's expert IT security engineers are available to help your business to perform a complete risk assessment and define a computer security plan to implement security policies and mechanisms to reduce ongoing assaults and dangers.

CISM Certified Information Security Support Expertise
The Certified Information Security Manager (CISM) organization defines the basic competencies and global standards of performance that IT security professionals are required to master. CISM gives business management the confidence that those who have earned their CISM credential have the experience and capability to deliver efficient security management and consulting services. Progent can provide the expertise of CISM certified security professionals to help companies with:

  • IS Security Governance
  • Vulnerability Management
  • IS Security Implementation Management
  • Information Security Management
  • Recovery Management
Learn more information about Progent's CISM Qualified Network Security Engineering Professionals.

CISSP Accredited Security Consulting Expertise
The CISSP credential recognizes expertise with a global standard for data security. ANSI (American National Standards Institute) has granted certification accreditation in the field of information protection defined by ISO/IEC 17024. Progent offers access to of security experts who have qualified for CISSP certification. Progent can give you access to a CISSP-certified expert to help your business in a variety security fields such as:

  • Security Administration Practices
  • Security Architecture and Models
  • Access Management Solutions and Processes
  • Software Development Security
  • Operations Security
  • Physical Security
  • Cryptography Mechanisms
  • Telecom, LAN and Internet Security
  • Business Continuity Planning
Find out additional information about Progent's CISSP-certified Information Security Consulting Services.

CISSP-ISSAP Qualified Secure Network Architecture Consulting Expertise
Progent's CISSP-ISSAP certified network architecture professionals are consultants who have been awarded ISSAP status as a result of thorough examination and significant work with information security design. The Information System Security Architecture Professional (ISSAP) certification represents proven mastery in the most challenging requirements of IS security architecture bounded by the wider scope of information security expertise needed for CISSP accreditation. Progent's ISSAP-qualified security specialists can help your company with all phases of secure network architecture such as.

  • Access Management Systems and Techniques
  • Phone System and System Infrastructure Security
  • Data Encryption Options
  • Needs Analysis and Security Standards
  • Business Continuity Planning and DRP
  • Physical Security
Find out more information about Progent's ISSAP Accredited Secure Network Architecture Engineering Expertise.

CISA Certified IS Security Auditing Engineering Support
The CISA accreditation is an important achievement that represents expertise in IS security audit and control. Accredited by ANSI, the CISA credential has consultants pass a comprehensive examination given by the ISACA international professional association. Progent's CISA network security audit specialists are available to assist your IT organization in the areas of:

  • Information Systems Audit Services
  • Information Technology Administration
  • Systems and Infrastructure Lifecycle
  • IT Support
  • Protecting Information Resources
  • Business Continuity Planning
Learn additional information concerning Progent's CISA Certified Security Auditing Consulting Expertise.

CRISC Consultants
The CRISC certification program was established by ISACA to validate a consultant's skills to design, implement, and support IS control mechanisms to reduce risk. Progent can provide the services of a CRISC-certified engineer to help you to create and carry out a business continuity or disaster recovery strategy based on industry best practices promoted by CRISC and geared to align with your company's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC-certified IT risk mitigation experts can provide a variety of risk assessment services such as:

  • Gather data and review documentation to evaluate significant risk scenarios
  • Identify legal, industry, and business mandates and company policies related to your information system to assess their potential impact on your strategic goals
  • Identify possible threats for your operational workflows to assist in evaluating your enterprise risk
  • Create a risk awareness program and provide seminars to make sure your organization understand information system risk so they can contribute to your risk control process
  • Match identified risk scenarios to related operational processes to help determine risk responsibility
  • Determine risk tolerance with your senior leadership and key stakeholders to ensure they are in agreement
Learn more details about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Accredited Security Engineering Support
GIAC (Global Information Assurance Certification) was established in 1999 to validate the skill of network security professionals. GIAC's goal is to verify that an accredited security consultant has the knowledge needed to deliver services in critical areas of network, information, and program security. GIAC accreditations are acknowledged by companies and government organizations all over the world including and the United States National Security Agency (NSA). Progent's GIAC-qualified security audit consultants are available to help your IT organization with:

Learn additional information about Progent's GIAC Information Assurance Services.

Contact a Security Specialist
To find out how you can get in touch with a certified security consultant for online or onsite assistance in Texas, call 1-800-993-9400 or visit Online Computer Help.














© 2002- 2019 Progent Corporation. All rights reserved.