Company information networks in the state of Texas now have prompt and affordable online access to Progent's qualified network security engineers to resolve the toughest security problems. The cost is competitive, charges are by the minute, engagement is immediate, and service is unbeatable. Progent also provides help for complex engagements that requires the knowledge of seasoned security engineers with high-level industry credentials.

In case your Texas business is far from larger urban areas such as Houston, San Antonio, Dallas, Austin, Fort Worth, or El Paso, access to local qualified network security experts could be limited when there's a crisis. This can result in a drop in productivity for your company, upset clients, idle workers, and distracted executives. By contacting Progent's online services, you have access to a certified security engineer ready to offer assistance when you require it to get your computer network running and salvage your data.

Progent can assist you in all your initiatives to guard your IT environment with support that ranges from security audits to developing a company-wide security plan. Progent offers affordable service to assist businesses of all sizes to design and manage secure networks based on Windows and Cisco technology and that may include servers and desktops running UNIX or Linux operating systems plus mobile clients with Apple handhelds or Android or Windows Phone smart phones and tablets.

Progent can also show you how to outsource spam filtering and protection from email-borne attacks. Email Guard is Progent's email security platform that incorporates the services and infrastructure of top data security vendors to provide centralized management and world-class protection for your email traffic. The hybrid architecture of Progent's Email Guard integrates cloud-based filtering with an on-premises security gateway device to provide complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne malware. ProSight Email Guard's Cloud Protection Layer serves as a preliminary barricade and keeps most unwanted email from making it to your security perimeter. This reduces your vulnerability to inbound attacks and conserves system bandwidth and storage. ProSight Email Guard's on-premises security gateway appliance provides a further layer of analysis for incoming email. For outgoing email, the on-premises gateway offers AV and anti-spam protection, DLP, and encryption. The onsite security gateway can also enable Exchange Server to monitor and safeguard internal email that stays inside your security perimeter.

Progent's security professionals are accessible online or in person to offer a range of urgent or longer-term computer security services which include:

If your company has an immediate need for IT security support, refer to Progent's Emergency Online Network Support.

Progent's security experts provide advanced support in key fields of computer protection that include security assessment, firewall and VPN expertise, and high-level security consulting.

Security Evaluation
Progent's expert security consultants can evaluate the strength of your current computer protection systems by performing comprehensive remote automated testing via sophisticated utilities and proven procedures. Progent's experience in administering this testing saves you consulting fees and assures an objective picture of security holes. The knowledge your company is provided can be used as the foundation of a network protection plan that will permit your information system to run safely and adapt quickly to future risks.

Automated Security Audits
Progent provides consulting in the application of security testing packages including Microsoft Baseline Security Analyzer (MBSA) and LANguard from GFI for economically running a variety of programmed system auditing scans to identify possible security problems. Progent has extensive knowledge of other security auditing tools including NMAP, AMAP, eEye Vulnerability Scanner, plus tools like Metasploit, Hydra, and Nikto. Progent can show you how to make sense of audit reports and react appropriately.

Progent can help you build security into your company processes, install scanning applications, define and implement a protected system architecture, and suggest policies to maximize the security of your network. Progent's security engineers are available to help you configure a firewall, design secure remote access to email and data, and integrate VPN. Learn more concerning Progent's network security evaluation.

Security Inventory Packages for Small Companies
Progent has put together two ultra-affordable security inventory service packages designed to allow small companies to receive an impartial security evaluation from a certified security consultant. With Progent's External Security Inventory Checkup, a security expert administers an extensive examination of your IT infrastructure from beyond your firewalled perimeter to uncover potential risks in the security profile you expose to the outside world. With Progent's Internal Security Inventory Scan, a security expert runs a network scan from a secure machine inside your firewall to uncover the risk to internal threats. The two security inventory services are configured and run from a secured external location. The process is managed by a consultant who has earned top security accreditations and who generates a document that summarizes and interprets the data collected by the scan and proposes practical remediation if called for.

Network Intrusion Analysis Support Services
Stealth penetration testing is an important component of any successful IT system security strategy. Progent’s security experts can run extensive intrusion checks without the awareness of your organization's internal IT staff. Unannounced penetration testing uncovers whether current security monitoring systems such as intrusion incident warnings and event log monitoring are correctly configured and actively checked. Learn more about Progent's network penetration testing consulting.

Firewall and Virtual Private Network Expertise
Progent's expertise in network security technology encompasses extensive familiarity with leading firewalls and Virtual Private Network (VPN) technology from multiple vendors such as Cisco, Microsoft, and Juniper. Progent can provide the support of consultants with important industry certifications such as CCIE and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Integration and Troubleshooting
The latest generation of ASA 5500-X Series of firewalls with Firepower Services deliver significantly more value than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX 500 security appliances for new deployments. After Cisco's acquisition of Sourcefire, the entire line of Cisco ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular intrusion protection system (IPS). Firepower services provide powerful new capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can assist you to manage your legacy PIX or Cisco ASA 5500 firewalls or upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your company to design, deploy, optimize, manage and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Read additional information about Cisco ASA Firewalls with Firepower configuration and troubleshooting services.

Cisco Network Security and Virtual Private Network Consulting Services
Cisco's security and remote access products provide a comprehensive line of easy-to-administer security products to help protect your local and remote network infrastructure. Cisco's Virtual Private Network line includes routers, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's expert staff of consultants includes field-proven engineers with Cisco CCIE and Cisco Certified Network Professional certifications who can assist your organization to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that fit most closely with your business objectives. Find out more details about Progent's Consulting Expertise for Cisco Security Solutions and Virtual Private Network Appliances.

Engineering Expertise for Additional Firewall and Virtual Private Network Technology
Progent offers small and mid-size organizations professional consulting for Intrusion Protection products and IPsec VPN solutions from major firewall and Virtual Private Network security companies including Check Point Software, Juniper, and SonicWALL. Progent can help you create a comprehensive security strategy and choose appropriate products from multiple suppliers to support your security objectives while sticking within your spending limits.

Progent's Low-Cost Managed Services for Information Security
Progent's affordable ProSight series of network monitoring and management services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection solution that utilizes cutting edge behavior analysis tools to defend endpoint devices and servers and VMs against modern malware attacks such as ransomware and email phishing, which easily evade legacy signature-matching anti-virus products. ProSight Active Security Monitoring protects local and cloud-based resources and provides a single platform to manage the entire malware attack progression including protection, detection, containment, cleanup, and post-attack forensics. Key features include single-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection services offer ultra-affordable in-depth protection for physical and virtual servers, desktops, smartphones, and Exchange email. ProSight ESP uses adaptive security and advanced heuristics for continuously monitoring and responding to security threats from all attack vectors. ProSight ESP delivers firewall protection, intrusion alarms, device management, and web filtering via leading-edge technologies packaged within one agent managed from a unified console. Progent's security and virtualization consultants can help you to design and configure a ProSight ESP environment that addresses your organization's specific requirements and that allows you prove compliance with government and industry data security regulations. Progent will assist you specify and configure policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alarms that require urgent attention. Progent's consultants can also assist your company to set up and test a backup and disaster recovery solution like ProSight Data Protection Services so you can get back in business quickly from a destructive cyber attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange filtering.

ProSight DPS: Managed Backup
ProSight Data Protection Services from Progent offer small and mid-sized organizations a low cost and fully managed service for secure backup/disaster recovery (BDR). Available at a fixed monthly cost, ProSight DPS automates and monitors your backup activities and allows fast recovery of vital files, applications and virtual machines that have become lost or damaged due to hardware breakdowns, software bugs, natural disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you protect, recover and restore files, folders, applications, system images, plus Hyper-V and VMware images. Important data can be backed up on the cloud, to an on-promises storage device, or to both. Progent's cloud backup consultants can deliver advanced support to configure ProSight DPS to be compliant with regulatory requirements like HIPPA, FINRA, PCI and Safe Harbor and, whenever needed, can assist you to restore your business-critical data. Find out more about ProSight Data Protection Services Managed Backup and Recovery.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the infrastructure of top data security vendors to deliver web-based management and comprehensive security for your inbound and outbound email. The powerful architecture of Email Guard combines a Cloud Protection Layer with a local gateway appliance to offer complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The Cloud Protection Layer acts as a first line of defense and blocks most unwanted email from making it to your network firewall. This decreases your vulnerability to external threats and conserves network bandwidth and storage. Email Guard's onsite security gateway device provides a deeper level of analysis for incoming email. For outgoing email, the onsite security gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email traffic that originates and ends within your corporate firewall. For more details, see ProSight Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and apps hosted in a secure Tier III data center on a high-performance virtual host set up and managed by Progent's network support experts. Under the ProSight Virtual Hosting service model, the client owns the data, the OS platforms, and the apps. Since the system is virtualized, it can be moved easily to an alternate hosting solution without requiring a time-consuming and technically risky configuration procedure. With ProSight Virtual Hosting, your business is not tied a single hosting service. Learn more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, find and protect data related to your IT infrastructure, processes, applications, and services. You can quickly locate passwords or IP addresses and be alerted automatically about impending expirations of SSLs or domains. By updating and managing your network documentation, you can eliminate as much as half of time spent searching for vital information about your network. ProSight IT Asset Management includes a centralized location for holding and collaborating on all documents required for managing your business network like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and relating IT information. Whether you’re making improvements, doing regular maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the information you need as soon as you need it. Find out more details about ProSight IT Asset Management service.

Certified Security Consulting
Every company ought to develop a thoroughly considered security strategy that incorporates both pre-attack procedures and response planning. The pre-attack plan is a set of steps designed to minimize security weaknesses. The post-attack plan assists your security engineers to evaluate the damage resulting from a security penetration, fix the network, document the event, and get business functions restored as quickly as possible.

Progent's certified IT security consultants are available to help your business to perform a comprehensive vulnerability evaluation and define a company-wide security plan to implement security processes and mechanisms to mitigate future attacks and dangers.

CISM Certified Information Security Support Expertise
The Certified Information Security Manager (CISM) committee defines the basic competencies and international standards of performance that IT security managers are expected to learn. CISM provides business management the assurance that those who have earned their CISM certification have the background and knowledge to provide efficient security management and support services. Progent offers the expertise of CISM qualified security consultants to assist companies with:

  • Network Security Governance
  • Vulnerability Management
  • Network Security Program Management
  • Information Security Management
  • Response Management
Find out more information concerning Progent's CISM Network Security Consulting Services.

CISSP Accredited Security Consulting Expertise
CISSP denotes expertise with an international standard for network security. ANSI (American National Standards Institute) has granted the CISSP credential recognition in the area of information protection under ISO 17024. Progent offers the services of security consultants who have qualified for CISSP certification. Progent can give you access to a CISSP-certified expert to help your business in a broad range of security areas including:

  • Security Management Practices
  • Security Architecture and Models
  • Access Management Systems and Processes
  • Applications Development Security
  • Secure Operations
  • Physical Security
  • Cryptography Technology
  • Telecom, Network and WAN Security
  • Disaster Recovery Preparedness
Learn additional details concerning Progent's CISSP Accredited IS Security Engineering Expertise.

ISSAP Accredited Secure IT Architecture Engineering Services
Progent's ISSAP qualified network architecture engineers are experts who have earned ISSAP status as a result of thorough testing and extensive work with network security design. The ISSAP credential indicates proven competence in the most challenging demands of information security architecture bounded by the broader field of information security knowledge needed for CISSP accreditation. Progent's ISSAP-certified security experts can help your business with all aspects of secure network architecture such as.

  • Access Management Mechanisms and Techniques
  • Telecom and Network Protection
  • Cryptography Options
  • Requirements Evaluation and Security Guidelines
  • Business Continuity Planning (BCP) and Disaster Recovery Planning
  • Hardware Security
Learn additional details about Progent's ISSAP Certified Secure Network Architecture Consulting Expertise.

CISA Accredited IS Security Auditing Consulting Support
The CISA credential is an important qualification that signifies expertise in information system security audit and control. Accredited by the American National Standards Institute, the CISA accreditation requires that candidates undergo a comprehensive test administered by the ISACA professional group. Progent's CISA-qualified IS security audit experts are available to assist your company with:

  • IS Audit Process
  • Information Technology Governance
  • Systems and Infrastructure Lifecycle
  • Information Technology Support
  • Safeguarding Information Resources
  • Business Continuity Preparedness
Learn more information concerning Progent's CISA Qualified Security Auditing Consulting Services.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC certification program was initiated by ISACA to validate an IT professional's skills to design, implement, and support IS control mechanisms to reduce network risk. Progent offers the expertise of a CRISC-certified engineer to help you to create and carry out a business continuity or disaster recovery plan based on leading practices promoted by CRISC and crafted to align with your organization's risk appetite, business goals, and IT budget. Progent's CRISC network risk management consultants offer a variety of risk identification services such as:

  • Gather data and review documentation to help identify major risk scenarios
  • Inventory legal, regulatory, and contractual mandates and organizational policies related to your network to assess their potential impact on your strategic objectives
  • Identify possible vulnerabilities for your operational processes to assist in analyzing your corporate risk
  • Develop a risk awareness initiative and conduct seminars to make sure your stakeholders appreciate IT risk so they can contribute to your risk management process
  • Connect key risk scenarios to related business processes to help determine risk responsibility
  • Determine risk appetite with executive management and key stakeholders to make sure they are in agreement
Learn additional information about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Qualified Network Security Consulting Assistance
GIAC was established in 1999 to certify the skill of computer security professionals. GIAC's mission is to ensure that an accredited professional possesses the knowledge appropriate to deliver support in key areas of system, data, and program security. GIAC certifications are acknowledged by businesses and institutions around the world including and the U.S. National Security Agency (NSA). Progent's GIAC-qualified network security audit specialists can assist your company with:

  • Auditing Perimeters
  • Incident Response
  • Traffic Analysis
  • Web Services Security
  • SIEM solutions
Learn additional information concerning Progent's GIAC Information Assurance Support.

Get in Touch with a Security Expert
To find out how to get in touch with a security engineer for remote or on-premises expertise in Texas, call 1-800-993-9400 or visit Online Computer Support.

© 2002- 2018 Progent Corporation. All rights reserved.