Business networks inAlabamanow have quick and economical online access to Progent's certified network security engineers to resolve critical security problems. The cost is reasonable, billing is per minute, sign-up is quick, and support is world class. Progent also provides assistance for long-term engagements that requires the services of seasoned security engineers with top industry credentials.
In case yourAlabamaorganization is based far from major metropolitan areas likeBirmingham, Birmingham, Mobile, or Huntsville, support from nearby accredited network security professionals is often problematic during a crisis. This can cause a drop in productivity for your company, angry customers, unproductive workers, and distracted executives. By contacting Progent, you can get in touch with a Premier security engineer who can provide assistance whenever you have to have it to keep your system on line and restore your information.
Progent can assist you in your efforts to guard your IT environment with support services that ranges from network security assessments to developing a company-wide security strategy. Progent provides economical support to help small and midsize companies to set up and maintain protected IT environments powered by Microsoft Windows and Cisco products and that can include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X platforms as well as mobile clients with Apple iOS handhelds or Google Android or Windows Phone smart phones and tablets.
Progent can also help you outsource spam filtering and protection from email-borne assaults. Email Guard is Progent's email security platform that incorporates the services and infrastructure of top information security companies to deliver web-based management and world-class security for your inbound and outbound email. The powerful structure of Email Guard managed service combines cloud-based filtering with an on-premises gateway device to offer complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. ProSight Email Guard's Cloud Protection Layer acts as a first line of defense and blocks most unwanted email from making it to your security perimeter. This reduces your exposure to inbound attacks and conserves system bandwidth and storage space. ProSight Email Guard's onsite security gateway appliance provides a deeper layer of inspection for incoming email. For outgoing email, the local security gateway provides AV and anti-spam filtering, policy-based Data Loss Prevention, and encryption. The onsite security gateway can also enable Microsoft Exchange Server to monitor and protect internal email that originates and ends within your corporate firewall.
Progent's certified consultants are accessible online or on site to provide a variety of urgent or longer-term network security services including:
If your network has an emergency need for computer security support, refer to Progent's Urgent Remote Network Help.
Progent's consultants can deliver world-class support in key areas of computer protection including auditing, firewall and VPN expertise, and high-level security planning.
System Security Audits
Progent's expert security engineers can assess the vulnerability of your existing computer security systems by performing comprehensive remote automated analysis via advanced software tools and tested procedures. Progent's experience in administering this testing saves you consulting fees and offers an objective portrayal of gaps. The information your company is provided can make up the basis of a network protection strategy that can allow your network to operate dependably and respond quickly to future risks.
Automated Network Vulnerability Evaluation
Progent provides consulting in the application of security evaluation software including Microsoft Baseline Security Analyzer (MBSA) and LANguard from GFI for affordably performing a variety of automatic network auditing scans to identify potential security vulnerabilities. Progent has extensive knowledge of additional security auditing products including NMAP Port Scanner, AMAP, eEye Vulnerability Scanner, plus tools like Metasploit, Netcat, Hydra, and Nikto. Progent can help you to make sense of testing reports and respond appropriately.
Progent can show you how to build protection into your company processes, install auditing tools, define and deploy a secure system environment, and recommend procedures to maximize the safety of your network. Progent's security professionals are available to help you configure a firewall, implement secure remote connectivity to email and business applications, and install virtual private network. Learn additional information on Progent's automated security assessment.
Security Inventory Scanning Bundles for Small Businesses
Progent offers two ultra-affordable security inventory and evaluation packages designed to allow small companies to receive an objective network security evaluation from an accredited security expert. With Progent's External Network Security Inventory Checkup, a security expert administers an extensive examination of your network from outside your company firewall to determine potential risks in the security profile you present to the public. With Progent's Internal Security Inventory Checkup, a security expert runs a system scan from an authorized machine inside your firewall to assess vulnerabilities to inside threats. Both security inventory services are set up and run from a protected remote site. The process is managed by an engineer with high-level security accreditations and who generates a document that details and interprets the information collected by the scan and proposes cost-effective remediation if appropriate.
Network Security Penetration Analysis Consulting
Stealth penetration checking is an important part of any serious network security plan. Progentís security professionals can perform extensive intrusion tests without the awareness of your organization's in-house network support resources. Unannounced penetration testing shows whether existing security monitoring tools such as intrusion incident warnings and event log monitoring are properly set up and actively monitored. Learn more concerning Progent's stealth penetration testing support services.
Firewalls and VPN Solutions
Progent's background in security solutions includes extensive field work with leading firewalls and Virtual Private Network (VPN) technology from multiple vendors including Cisco, Microsoft, and Symantec. Progent can provide the services of engineers with key industry certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Troubleshooting
The latest generation of Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer substantially more performance than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX 500 firewalls for all new deployments. Since Cisco's acquisition of Sourcefire, the whole family of Cisco ASA 5500-X devices can be configured to enable Firepower Services, built on Sourcefire's Snort product, which is the world's most deployed intrusion protection system. Firepower services bring powerful new capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-premier CCIE network consultants can help you to manage your legacy PIX or Cisco ASA 5500 security appliances or upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can help you to design, integrate, tune, manage and troubleshoot firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. See additional details about Cisco ASA 5500-X Firewalls with Firepower configuration and debugging services.
Cisco Security and Virtual Private Network Engineering Expertise
Cisco's security and remote access technology represent a comprehensive range of easy-to-administer security products to help safeguard your local and remote information system. Cisco's VPN product family features routers, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's expert consulting staff includes experienced specialists with Cisco Certified Internetwork Expert and Cisco Certified Network Professional qualifications who can help your organization to select Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that align best with your company objectives. Read more details concerning Progent's Engineering Expertise for Cisco Security Solutions and VPN Products.
Consulting Expertise for Other Firewall and Virtual Private Network Technology
Progent provides small and medium size companies expert support for Intrusion Protection products and IPsec VPN solutions from leading firewall and VPN security vendors including Check Point Software, Juniper, and Symantec. Progent can show you how to design a detailed security plan and select the right products from a variety of suppliers to support your security goals while sticking within your spending restraints.
Progent's Flat-rate Managed Services for Information Security
Progent's low-cost ProSight line of outsourced network management services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates next generation behavior analysis technology to defend endpoints and physical and virtual servers against modern malware attacks such as ransomware and email phishing, which routinely evade traditional signature-based AV tools. ProSight Active Security Monitoring safeguards local and cloud resources and provides a unified platform to address the entire threat progression including blocking, infiltration detection, containment, remediation, and post-attack forensics. Top features include single-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
ProSight Enhanced Security Protection (ESP) managed services offer ultra-affordable in-depth security for physical and virtual servers, workstations, smartphones, and Exchange Server. ProSight ESP uses contextual security and advanced machine learning for round-the-clock monitoring and responding to cyber threats from all vectors. ProSight ESP delivers firewall protection, intrusion alarms, device management, and web filtering through cutting-edge tools packaged within a single agent accessible from a unified control. Progent's security and virtualization experts can assist your business to design and implement a ProSight ESP environment that addresses your company's unique requirements and that helps you prove compliance with legal and industry information protection regulations. Progent will assist you specify and configure security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alarms that require urgent action. Progent can also assist you to set up and verify a backup and disaster recovery system like ProSight Data Protection Services so you can recover quickly from a destructive security attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange email filtering.
ProSight DPS: Managed Backup
ProSight Data Protection Services provide small and medium-sized businesses a low cost and fully managed service for reliable backup/disaster recovery (BDR). For a fixed monthly rate, ProSight DPS automates and monitors your backup activities and enables fast recovery of critical data, applications and virtual machines that have become unavailable or corrupted as a result of component failures, software glitches, disasters, human error, or malicious attacks such as ransomware. ProSight DPS can help you back up, recover and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to an on-promises storage device, or mirrored to both. Progent's BDR specialists can deliver world-class expertise to set up ProSight DPS to to comply with regulatory standards like HIPAA, FIRPA, and PCI and, when necessary, can assist you to recover your business-critical information. Read more about ProSight Data Protection Services Managed Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the technology of top data security companies to provide web-based control and comprehensive protection for your email traffic. The powerful structure of Progent's Email Guard combines a Cloud Protection Layer with an on-premises security gateway device to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne threats. The cloud filter acts as a preliminary barricade and blocks the vast majority of threats from making it to your security perimeter. This reduces your vulnerability to inbound threats and saves system bandwidth and storage. Email Guard's on-premises security gateway appliance provides a further layer of analysis for inbound email. For outgoing email, the on-premises gateway provides AV and anti-spam protection, DLP, and email encryption. The on-premises gateway can also help Microsoft Exchange Server to monitor and protect internal email traffic that stays inside your security perimeter. For more information, visit ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a protected fault tolerant data center on a fast virtual machine host configured and managed by Progent's IT support experts. With the ProSight Virtual Hosting model, the customer retains ownership of the data, the operating system platforms, and the apps. Since the system is virtualized, it can be ported immediately to an alternate hardware environment without requiring a lengthy and technically risky configuration procedure. With ProSight Virtual Hosting, your business is not tied one hosting service. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, update, find and safeguard data related to your IT infrastructure, procedures, applications, and services. You can instantly find passwords or serial numbers and be alerted about upcoming expirations of SSLs ,domains or warranties. By cleaning up and managing your network documentation, you can eliminate up to half of time wasted searching for critical information about your IT network. ProSight IT Asset Management features a centralized location for storing and collaborating on all documents required for managing your network infrastructure such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers advanced automation for gathering and associating IT data. Whether youíre making enhancements, performing regular maintenance, or responding to a crisis, ProSight IT Asset Management gets you the data you need the instant you need it. Learn more about ProSight IT Asset Management service.
Expert Security Consulting
Any company should develop a carefully considered security strategy that includes both preventive procedures and reaction plans. The pre-attack plan is a set of procedures designed to reduce security weaknesses. The post-attack plan assists your company's IT security personnel to evaluate the damage caused by a security penetration, repair the system, record the experience, and get the IT network operational as soon as possible.
Progent's expert IT security consultants can to assist your business to run a comprehensive vulnerability evaluation and define a company-wide security strategy to implement security policies and mechanisms to reduce ongoing assaults and threats.
CISM Certified Security Support Expertise
The CISM committee describes the basic competencies and international standards of skill that information security professionals are required to learn. It gives executive management the assurance that those who have qualified for their CISM certification have the experience and knowledge to provide effective security administration and support services. Progent offers the support of CISM Certified security professionals to help companies with:
Learn more information about Progent's CISM Qualified Security Consulting Professionals.
- IS Security Governance
- Vulnerability Analysis
- Network Security Program Management
- IS Security Administration
- Response Management
CISSP Qualified Security Consulting Services
The CISSP credential recognizes expertise with a worldwide standard for network security. The American National Standards Institute has awarded certification recognition in the field of data protection defined by ISO/IEC 17024. Progent can provide the services of security consultants who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified expert to help your enterprise in a variety security areas such as:
Learn more details about Progent's CISSP Network Security Support Services.
- Security Management Procedures
- Security Architecture and Models
- Access Control Systems and Processes
- Applications Development Security
- Operations Security
- Site Security
- Data Encryption Mechanisms
- Telecommunications, LAN and Internet Security
- Business Continuity Planning
CISSP-ISSAP Accredited Secure Information System Architecture Consulting Services
Progent's CISSP-ISSAP Premier system architecture professionals are experts who have been awarded ISSAP status as a result of rigorous testing and significant work with network security architecture. The ISSAP certification represents demonstrated mastery in the most in-depth demands of information security architecture bounded by the wider field of IS security knowledge required for CISSP certification. Progent's ISSAP-premier security specialists can assist your business with all phases of architecture security including.
Learn additional details concerning Progent's ISSAP Certified Secure Information System Architecture Engineering Expertise.
- Access Control Mechanisms and Methodologies
- Telecommunications and Network Security
- Data Encryption Options
- Needs Analysis and Security Guidelines
- Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
- Physical Security
CISA Qualified Security Auditing Engineering Services
The Certified Information Systems Auditor credential is a globally recognized achievement that signifies mastery in information system security auditing. Accredited by the American National Standards Institute, the CISA accreditation has candidates pass a comprehensive examination administered by the ISACA international professional group. Progent's CISA network security audit engineers are available to help your business in the areas of:
Read additional details about Progent's CISA Qualified Information System Security Auditing Consulting Expertise.
- IS Audit Process
- Information Technology Governance
- Systems and Architecture Planned Useful Life
- IT Support
- Protecting Information Resources
- Disaster Recovery Planning
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA in 2010 to validate an IT professional's skills to design, implement, and maintain information system control mechanisms to reduce risk. Progent can provide the expertise of a CRISC-certified consultant to assist your company to create and execute a business continuity plan based on industry best practices identified by CRISC and geared to align with your company's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC network risk management experts offer a range of risk assessment services such as:
Get the details concerning Progent's CRISC Risk Management Consultants.
- Gather information and review documentation to help identify major vulnerabilities
- Identify legal, industry, and business mandates and organizational standards associated with your information system to determine their potential influence on your business objectives
- Point out possible vulnerabilities for your operational workflows to help in analyzing your corporate risk
- Create a risk awareness initiative and conduct training to make sure your stakeholders understand IT risk so they can contribute to your risk control process
- Connect key risk scenarios to your associated business procedures to help assign risk ownership
- Determine risk appetite with executive leadership and major stakeholders to ensure they are in agreement
GIAC Certified Information System Security Consulting Assistance
Global Information Assurance Certification was founded in 1999 to validate the knowledge of information technology security professionals. GIAC's mission is to make sure that a certified professional possesses the skills necessary to deliver support in vital areas of network, information, and application software security. GIAC certifications are acknowledged by businesses and institutions throughout the world including and the U.S. National Security Agency (NSA). Progent's GIAC-qualified information security audit specialists are available to assist your company with:
Learn more information about Progent's GIAC Information Assurance Services.
- Auditing IT Infrastructure
- Incident Response
- Intrusion Detection
- Web Application Security
- SIEM solutions
Contact a Progent Security Specialist
To see how you can access a certified security consultant for online or on-premises support in Alabama, phone 1-800-993-9400 or go to Remote Computer Help.