Small business networks in the state of Texas can depend on prompt and affordable online help from Progent's certified network security consultants to resolve the toughest security problems. The cost is reasonable, charges are by the minute, sign-up is fast, and service is unbeatable. Progent also provides assistance for complex projects that demand the knowledge of senior security consultants with top industry credentials.

In case your Texas network is based outside of larger urban neighborhoods such as Houston, San Antonio, Dallas, Austin, Fort Worth, or El Paso, the availability of local certified security professionals may be limited when you have an urgent situation. This could mean a drop in revenue for your company, angry customers, unproductive employees, and defocused management. By utilizing Progent's remote support, you can get in touch with a qualified security professional who can deliver assistance whenever you require it to get your network running and restore your information.

Progent can help you in a variety of ways in your efforts to protect your network with services that ranges from security assessments to developing a comprehensive security strategy. Progent offers affordable support to assist companies of any size to configure and manage protected IT environments based on Microsoft Windows and Cisco products and that may include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X operating systems plus BYOD clients with Apple handhelds or Android or Windows Phone handsets.

Progent can also show you how to outsource spam blocking and defense against e-mail-based security threats. Email Guard is Progent's email security solution that incorporates the technology of top information security companies to deliver centralized management and comprehensive protection for all your inbound and outbound email. The hybrid architecture of Progent's Email Guard managed service combines a Cloud Protection Layer with a local gateway device to offer advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. ProSight Email Guard's Cloud Protection Layer serves as a preliminary barricade and keeps the vast majority of unwanted email from reaching your security perimeter. This reduces your exposure to inbound attacks and conserves network bandwidth and storage. ProSight Email Guard's onsite security gateway appliance adds a deeper level of analysis for inbound email. For outbound email, the onsite gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also help Exchange Server to monitor and protect internal email traffic that stays within your corporate firewall.

Progent's certified consultants are accessible remotely or on site to provide a variety of emergency or project-based IT security services which include:

If your company has an emergency need for IT security support, go to Progent's Emergency Remote Technical Support.

Progent's engineers offer world-class support in key fields of system security that include security assessment, firewalls and VPN, and high-level security consulting.

Security Assessment
Progent's expert security consultants can evaluate the vulnerability of your current network protection implementation by performing comprehensive remote automated analysis based on sophisticated utilities and tested techniques. Progent's skill in administering this service saves you time and money and offers an accurate picture of security holes. The information your business is provided can be used as the foundation of a security strategy that will allow your network to operate safely and respond quickly to future threats.

Automated Security Assessment
Progent offers consulting in the use of security evaluation utilities including Microsoft Baseline Security Analyzer and GFI LANguard NSS for economically performing a variety of automatic network testing scans to uncover potential security holes. Progent has broad experience with other network auditing utilities such as NMAP, AMAP Application Scanner, eEye, plus utilities like Metasploit Framework, Netcat, and Nikto. Progent can help you to understand audit reports and respond appropriately.

Progent can show you how to build security into your business processes, configure scanning tools, define and implement a secure network architecture, and recommend policies to optimize the safety of your network. Progent's security engineers are available to help you configure a firewall, implement safe remote connectivity to email and business applications, and install virtual private network. Find out more concerning Progent's network security evaluation.

Security Inventory and Evaluation Packages for Small Businesses
Progent offers two low-cost security inventory bundles designed to allow small companies to receive a professional network security evaluation from a qualified security consultant. With Progent's External Network Security Inventory Scan, a security engineer administers an extensive examination of your network from outside your firewalled perimeter to determine potential weaknesses in the security posture you expose to the outside world. With Progent's Internal Security Inventory Scan, an engineer executes a system scan from a secure machine within your firewall to evaluate the risk to internal attacks. Both security inventory packages are configured and executed from a protected remote site. The project is overseen by a consultant who has earned high-level security accreditations and who produces a report that details and interprets the data collected by the security scan and suggests cost-effective improvements if appropriate.

Stealth Penetration Testing Support Services
Stealth penetration testing is a key part of any serious IT system security strategy. Progentís security experts can perform extensive intrusion checks without the knowledge of your organization's in-house network support staff. Stealth penetration testing shows whether current security monitoring systems such as intrusion incident warnings and event log analysis are correctly set up and actively checked. Learn more about Progent's network security penetration analysis consulting.

Firewall And Virtual Private Network (VPN) Support
Progent's expertise in security technology encompasses in-depth familiarity with leading firewalls and Virtual Private Network (VPN) technology offered by a variety of companies such as Cisco, Microsoft, and Juniper. Progent offers the support of engineers with key industry certifications such as Cisco Certified Internetwork Expert and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Debugging
The current ASA 5500-X Family of firewalls with Firepower Services offer significantly more performance than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX security appliances for new installations. Following Cisco's purchase of Sourcefire, the whole line of ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort technology, which is the market's most deployed network intrusion protection system. Firepower services bring powerful new capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can help your company to maintain your current PIX or ASA 5500 security appliances and migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your business to design, configure, optimize, administer and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. See more information about ASA Firewalls with Firepower Services configuration and troubleshooting services.

Cisco Network Security and Virtual Private Network Engineering Expertise
Cisco's network security and remote connection technology provide a full line of manageable security solutions to help safeguard your local and remote network infrastructure. Cisco's VPN line includes switches, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's professional consulting staff includes field-proven engineers with Cisco Certified Internetwork Expert and Cisco Certified Network Professional qualifications who can help your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that fit most closely with your business objectives. Find out additional details about Progent's Engineering Expertise for Cisco Security and Virtual Private Network Products.

Engineering Expertise for Other Firewall and Virtual Private Network Products
Progent provides small and mid-size companies expert consulting for Intrusion Protection products and IPsec VPN solutions from leading firewall and Virtual Private Network security companies including WatchGuard, Juniper, and SonicWALL. Progent can help you design a detailed security plan and select appropriate technologies from multiple suppliers to achieve your security goals while staying within your spending restraints.

Progent's Fixed-price Managed Services for Information Assurance
Progent's affordable ProSight series of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance. ProSight managed services available from Progent include:
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the technology of leading data security vendors to deliver centralized management and world-class protection for all your email traffic. The powerful structure of Email Guard integrates a Cloud Protection Layer with an on-premises security gateway device to provide complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne threats. The cloud filter acts as a preliminary barricade and blocks most threats from reaching your security perimeter. This decreases your vulnerability to inbound attacks and saves system bandwidth and storage space. Email Guard's on-premises gateway device provides a further layer of analysis for inbound email. For outbound email, the onsite security gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The onsite gateway can also assist Microsoft Exchange Server to monitor and protect internal email that originates and ends within your corporate firewall. For more details, visit ProSight Email Guard spam filtering and data leakage protection.

ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes next generation behavior analysis technology to defend endpoint devices and servers and VMs against modern malware attacks such as ransomware and email phishing, which easily evade traditional signature-matching AV tools. ProSight Active Security Monitoring safeguards local and cloud-based resources and provides a unified platform to automate the entire malware attack lifecycle including protection, detection, mitigation, remediation, and post-attack forensics. Top features include one-click rollback using Windows Volume Shadow Copy Service and real-time network-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.

ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services offer small and mid-sized organizations a low cost end-to-end service for secure backup/disaster recovery. Available at a fixed monthly price, ProSight DPS automates and monitors your backup activities and enables rapid recovery of critical files, applications and VMs that have become lost or damaged due to hardware breakdowns, software glitches, disasters, human error, or malware attacks like ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, applications, system images, plus Hyper-V and VMware images. Critical data can be protected on the cloud, to a local device, or to both. Progent's cloud backup specialists can deliver world-class support to set up ProSight Data Protection Services to to comply with regulatory requirements like HIPPA, FINRA, PCI and Safe Harbor and, whenever needed, can help you to recover your business-critical data. Find out more about ProSight Data Protection Services Managed Backup.

ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, update, retrieve and protect data about your IT infrastructure, procedures, applications, and services. You can quickly find passwords or serial numbers and be alerted automatically about upcoming expirations of SSL certificates or domains. By cleaning up and organizing your IT documentation, you can save as much as half of time thrown away looking for vital information about your network. ProSight IT Asset Management features a centralized location for holding and sharing all documents related to managing your business network like recommended procedures and How-To's. ProSight IT Asset Management also offers advanced automation for gathering and relating IT information. Whether youíre planning improvements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the knowledge you need as soon as you need it. Learn more details about Progent's ProSight IT Asset Management service.

Certified Network Security Consulting
Every business should have a carefully considered security strategy that incorporates both pre-attack procedures and reaction planning. The pre-attack strategy is a set of steps designed to reduce vulnerabilities. The post-attack strategy assists your company's network security engineers to assess the impact resulting from an attack, repair the system, document the experience, and get business functions operational as soon as possible.

Progent's certified information security engineers can to assist your company to run a comprehensive vulnerability assessment and define a network security plan to implement security policies and controls to reduce ongoing attacks and threats.

CISM Certified System Security Engineering Services
The CISM organization describes the basic capabilities and worldwide standards of skill that IT security professionals are expected to learn. CISM provides business management the assurance that consultants who have qualified for their CISM certification have the experience and capability to provide effective security management and consulting services. Progent can provide the expertise of CISM certified security consultants to assist companies with:

  • IS Security Processes
  • Vulnerability Analysis
  • IS Security Implementation Management
  • Information Security Administration
  • Response Management
Learn additional information about Progent's CISM Qualified Security Consulting Professionals.

CISSP Qualified Security Engineering Assistance
CISSP denotes expertise with an international standard for data security. The American National Standards Institute has granted certification recognition in the area of data protection under ISO 17024. Progent can provide the services of security experts who have earned CISSP certification. Progent can give you access to a CISSP-certified consultant to help your enterprise in a broad range of security areas including:

  • Security Management Practices
  • Security Architecture and Paradigms
  • Access Management Solutions and Processes
  • Software Development Security
  • Secure Operations
  • Site Security
  • Encryption/Decryption Technology
  • Telecom, Network and Internet Security
  • Business Continuity Planning
Learn additional information concerning Progent's CISSP Information Security Consulting Services.

ISSAP Accredited Secure Information System Architecture Consulting Expertise
Progent's ISSAP qualified network architecture professionals are consultants who have been awarded ISSAP status through rigorous examination and significant work with network security design. The Information System Security Architecture Professional (ISSAP) credential represents demonstrated skill in the more complex demands of IS security architecture within the wider scope of information security knowledge required for CISSP certification. Progent's ISSAP-certified security specialists can help your business with all aspects of architecture security such as.

  • Access Management Systems and Techniques
  • Telecommunications and Network Infrastructure Security
  • Data Encryption Options
  • Requirements Evaluation and Security Standards
  • BCP and Disaster Recovery Planning (DRP)
  • Site Security
Read more details about Progent's ISSAP Accredited Secure Information System Architecture Support Services.

CISA Certified Security Auditing Engineering Assistance
The CISA accreditation is an important qualification that signifies expertise in IS security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA credential has consultants undergo an extensive test given by the ISACA international professional group. Progent's CISA-qualified security audit specialists are available to assist your company with:

  • Information Systems Audit Services
  • Information Technology Administration
  • Systems and Architecture Lifecycle Planning
  • Information Technology Support
  • Protecting Information Resources
  • Business Continuity Preparedness
Get more information concerning Progent's CISA Certified Network Security Auditing Consulting Assistance.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC program was initiated by ISACA to verify an IT professional's skills to plan, implement, and support information system control mechanisms to mitigate risk. Progent can provide the expertise of a CRISC-certified consultant to assist you to develop and execute a business continuity or disaster recovery plan based on industry best practices promoted by CRISC and crafted to match your organization's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC-certified network risk mitigation specialists offer a variety of risk identification services including:

  • Collect information and study documentation to identify major vulnerabilities
  • Inventory legal, industry, and contractual mandates and company standards related to your network to assess their potential influence on your business objectives
  • Identify potential vulnerabilities for your business processes to help in evaluating your corporate risk
  • Create a risk awareness program and provide training to ensure your stakeholders understand IT risk so they can assist with your risk control process
  • Connect identified risk vectors to related business procedures to help determine risk ownership
  • Validate risk appetite with your senior management and key stakeholders to make sure they match
Read additional information concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Qualified Network Security Engineering Assistance
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the knowledge of IT security experts. GIAC's goal is to assure that an accredited security consultant has the knowledge needed to deliver support in important areas of system, information, and program security. GIAC accreditations are recognized by businesses and institutions throughout the world including and the U.S. National Security Agency. Progent's GIAC IS security audit specialists can help your business in the areas of:

Find out more information about Progent's GIAC Information Assurance Support.

Get in Touch with a Certified Security Specialist
To see how to contact a Progent security consultant for remote or onsite support in Texas, call 1-800-993-9400 or go to Remote Computer Support.














© 2002- 2018 Progent Corporation. All rights reserved.