Business information networks in the state of Alabama can now get quick and economical online help from Progent's certified network security experts to fix urgent security issues. The cost is affordable, billing is per minute, sign-up is immediate, and support is unbeatable. Progent also offers help for complex engagements that demand the services of senior security consultants with high-level industry credentials.

In case your Alabama small business is located some distance from more populated urban areas like Birmingham, Birmingham, Mobile, or Huntsville, access to local qualified security professionals may be limited when there's a crisis. This could mean a loss of income for your business, upset customers, unproductive workers, and defocused executives. By utilizing Progent, you can get in touch with a Premier security engineer ready to provide assistance whenever you require it to keep your system on line and recover your information.

Progent can assist you in a variety of ways in your efforts to defend your network with support services ranging from security audits to creating a comprehensive security plan. Progent offers affordable service to assist small and midsize companies to configure and manage secure IT environments powered by Microsoft Windows and Cisco products and that may include servers and desktops based on UNIX or Linux operating systems as well as mobile clients with Apple handhelds or Google Android or Windows Phone smart phones and tablets.

Progent can also assist you to outsource spam filtering and defense against email-borne assaults. Email Guard is Progent's email security solution that uses the services and infrastructure of leading information security companies to deliver web-based management and comprehensive protection for all your email traffic. The hybrid architecture of Email Guard managed service integrates cloud-based filtering with an on-premises gateway appliance to provide complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The cloud filter serves as a preliminary barricade and keeps most unwanted email from making it to your network firewall. This decreases your exposure to inbound attacks and conserves network bandwidth and storage. ProSight Email Guard's on-premises gateway appliance adds a deeper level of inspection for incoming email. For outbound email, the on-premises security gateway offers AV and anti-spam filtering, protection against data leaks, and encryption. The onsite gateway can also help Exchange Server to track and protect internal email that stays inside your corporate firewall.

Progent's security consultants are available online or on site to offer a range of emergency or longer-term IT security services which include:

If your network has an emergency requirement for IT security help, refer to Progent's Emergency Online Technical Help.

Progent's security experts can deliver world-class services in key areas of network protection that include auditing, firewalls and VPN, and high-level security planning.

System Audits
Progent's expert security consultants can assess the strength of your current network protection systems through comprehensive remote automated analysis via sophisticated utilities and proven procedures. Progent's experience in administering this service saves your company money and assures an objective portrayal of security holes. The knowledge your company gains can make up the foundation of a network protection plan that will allow your information system to run safely and respond rapidly to future threats.

Automated Security Analysis
Progent offers consulting in the application of security auditing packages such as Microsoft's MBSA and LANguard from GFI for economically running a set of automatic system auditing checks to uncover potential security weaknesses. Progent has broad knowledge of additional security analysis products such as NMAP, AMAP Application Scanner, eEye, as well as utilities like Metasploit Framework, Netcat, and Nikto. Progent can help you to make sense of audit reports and react effectively.

Progent can show you how to build security into your business operations, configure auditing tools, plan and deploy a protected network environment, and recommend procedures to maximize the safety of your network. Progent's security professionals are available to show you how to set up a firewall, design secure remote access to email and data, and integrate virtual private network. Learn more concerning Progent's automated security audits.

Security Inventory Service Bundles for Small Companies
Progent has put together two ultra-affordable security inventory packages designed to enable small companies to get a professional security assessment from an accredited security consultant. With Progent's External Network Security Inventory Checkup, a security engineer administers a comprehensive examination of your network from outside your firewall to determine possible risks in the security posture you expose to the public. With Progent's Internal Network Security Inventory Checkup, a security engineer runs a network scan from a secure computer within your firewall to assess your exposure to internal assaults. The two security inventory services are configured and executed from a secured external location. The project is overseen by an engineer who has earned top security accreditations and who generates a document that summarizes and interprets the information collected by the scan and proposes practical improvements where called for.

Stealth Security Penetration Testing Consulting
Stealth intrusion checking is a key part of any serious network security plan. Progentís security professionals can run thorough penetration checks without the awareness of your company's internal network support staff. Unannounced penetration checking shows whether existing security monitoring tools such as intrusion detection alerts and event history analysis are correctly set up and consistently checked. Find out additional information concerning Progent's network penetration analysis consulting.

Firewall And Virtual Private Network (VPN) Support
Progent's expertise in network security solutions includes in-depth familiarity with major firewalls and Virtual Private Network (VPN) products from multiple companies such as Cisco, Microsoft, and CheckPoint. Progent can provide the support of consultants who have earned important networking certifications such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Integration and Debugging
The latest generation of Cisco ASA 5500-X Family of firewalls with Firepower Services deliver substantially more performance than Cisco's previous firewalls and have replaced the ASA 5500 and PIX firewalls for all new deployments. After Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X devices can be configured to support Firepower Services, built on Sourcefire's Snort technology, which is the world's most deployed network intrusion protection system. Firepower services provide powerful new features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can assist your company to manage your current PIX or Cisco ASA 5500 firewalls or upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your business to plan, configure, tune, manage and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Find out more details about Cisco ASA Firewalls with Firepower integration and troubleshooting services.

Cisco Network Security and Virtual Private Network Support Expertise
Cisco's network security and remote access products provide a complete line of manageable security solutions to help safeguard your local and remote information system. Cisco's Virtual Private Network line features switches, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's professional staff of consultants includes field-proven engineers with Cisco Certified Internetwork Expert and CCNP qualifications who are able to help your business to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that fit best with your company goals. Read more details about Progent's Consulting Expertise for Cisco Security Technology and Virtual Private Network Appliances.

Engineering Expertise for Other Firewall and Virtual Private Network Products
Progent offers small and medium size businesses professional consulting for Intrusion Protection Systems and IPsec VPN technology from major firewall and VPN security vendors such as WatchGuard, Juniper, and SonicWall. Progent can help you create a comprehensive security plan and choose the right products from a variety of suppliers to achieve your security goals while sticking within your budget limits.

Progent's Low-Cost Managed Services for Information Security
Progent's affordable ProSight portfolio of outsourced network management services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. ProSight managed services available from Progent include:

ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that utilizes cutting edge behavior machine learning tools to guard endpoints and servers and VMs against modern malware assaults such as ransomware and email phishing, which easily get by traditional signature-matching AV tools. ProSight Active Security Monitoring protects on-premises and cloud-based resources and offers a single platform to address the complete threat progression including protection, infiltration detection, mitigation, cleanup, and forensics. Top features include one-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection: Unified Endpoint Security
ProSight Enhanced Security Protection services offer affordable multi-layer protection for physical and virtual servers, workstations, mobile devices, and Exchange Server. ProSight ESP uses adaptive security and modern behavior analysis for round-the-clock monitoring and reacting to cyber threats from all vectors. ProSight ESP provides two-way firewall protection, intrusion alarms, endpoint management, and web filtering through leading-edge technologies incorporated within one agent managed from a single control. Progent's security and virtualization consultants can assist you to plan and implement a ProSight ESP deployment that meets your company's unique requirements and that allows you prove compliance with legal and industry data security regulations. Progent will help you define and configure policies that ProSight ESP will manage, and Progent will monitor your network and react to alarms that require immediate action. Progent can also assist you to install and verify a backup and disaster recovery solution like ProSight Data Protection Services so you can get back in business quickly from a potentially disastrous security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange email filtering.

ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services from Progent offer small and medium-sized businesses a low cost end-to-end service for reliable backup/disaster recovery. Available at a fixed monthly rate, ProSight Data Protection Services automates your backup processes and enables rapid restoration of critical files, apps and virtual machines that have become lost or corrupted as a result of hardware breakdowns, software bugs, disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images, as well as Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to an on-promises device, or mirrored to both. Progent's cloud backup consultants can provide world-class support to set up ProSight Data Protection Services to to comply with regulatory standards such as HIPPA, FINRA, PCI and Safe Harbor and, when needed, can assist you to restore your critical information. Find out more about ProSight DPS Managed Cloud Backup and Recovery.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the technology of leading information security companies to provide centralized management and world-class protection for all your inbound and outbound email. The powerful architecture of Progent's Email Guard combines a Cloud Protection Layer with a local gateway device to provide complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. Email Guard's Cloud Protection Layer serves as a first line of defense and blocks most threats from making it to your security perimeter. This decreases your exposure to external attacks and conserves system bandwidth and storage. Email Guard's onsite gateway device provides a deeper level of inspection for incoming email. For outbound email, the on-premises gateway offers anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The on-premises security gateway can also assist Microsoft Exchange Server to monitor and protect internal email that originates and ends inside your security perimeter. For more details, see ProSight Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and apps hosted in a protected fault tolerant data center on a high-performance virtual host configured and managed by Progent's IT support experts. Under the ProSight Virtual Hosting model, the client owns the data, the OS platforms, and the apps. Since the environment is virtualized, it can be moved immediately to a different hardware solution without requiring a lengthy and technically risky reinstallation process. With ProSight Virtual Hosting, your business is not locked into one hosting service. Learn more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, maintain, find and protect information related to your IT infrastructure, procedures, applications, and services. You can instantly find passwords or serial numbers and be warned about upcoming expirations of SSLs ,domains or warranties. By updating and managing your IT documentation, you can save as much as 50% of time wasted searching for vital information about your network. ProSight IT Asset Management includes a common location for storing and sharing all documents required for managing your network infrastructure such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports a high level of automation for gathering and associating IT data. Whether youíre making improvements, performing regular maintenance, or responding to an emergency, ProSight IT Asset Management gets you the knowledge you require the instant you need it. Find out more details about Progent's ProSight IT Asset Management service.

Certified Security Design
Any company ought to develop a carefully considered security strategy that incorporates both preventive processes and reaction planning. The proactive plan is a set of mechanisms designed to minimize security weaknesses. The post-attack plan assists your company's security personnel to assess the damage caused by a security penetration, repair the network, record the experience, and get the IT network operational as soon as possible.

Progent's certified information security engineers can to assist you to perform a complete vulnerability assessment and create a company-wide security plan to establish security processes and controls to mitigate ongoing assaults and dangers.

CISM Accredited Information Security Support Services
The CISM committee defines the core competencies and international standards of performance that IT security professionals are required to learn. CISM gives business management the assurance that consultants who have earned their CISM credential have the background and capability to provide effective security administration and support services. Progent can provide the services of CISM Certified security consultants to help companies with:

  • IS Security Processes
  • Vulnerability Analysis
  • Network Security Program Management
  • Network Security Management
  • Response Planning
Find out more details about Progent's CISM Certified Information Security Support Professionals.

CISSP Certified Security Engineering Services
CISSP certification recognizes mastery of a worldwide standard for network security. ANSI (American National Standards Institute) has awarded the CISSP credential recognition in the area of information security defined by ISO 17024. Progent offers access to of security consultants who have earned CISSP accreditation. Progent can give you access to a CISSP-certified expert to help your business in a broad range of security areas including:

  • Security Administration Procedures
  • Security Infrastructure and Models
  • Access Control Solutions and Processes
  • Software Development Security
  • Operations Security
  • Site Security
  • Cryptography Mechanisms
  • Telecommunications, Network and Internet Security
  • Disaster Recovery Preparedness
Find out more information concerning Progent's CISSP Qualified Network Security Consulting Expertise.

CISSP-ISSAP Accredited Secure Information System Architecture Engineering Services
Progent's CISSP-ISSAP Certified information system architecture professionals are experts who have been awarded ISSAP status as a result of rigorous examination and extensive work with network security design. The ISSAP credential represents proven competence in the most challenging demands of information system security architecture bounded by the broader field of information security knowledge needed for CISSP accreditation. Progent's ISSAP-premier security experts can help your business with all aspects of secure network architecture such as.

  • Access Management Mechanisms and Methodologies
  • Telecommunications and Network Infrastructure Security
  • Encryption/Decryption Options
  • Requirements Analysis and Security Guidelines
  • Business Continuity Planning and Disaster Recovery Planning (DRP)
  • Site Security
Learn additional information concerning Progent's ISSAP Accredited Secure Information System Architecture Engineering Professionals.

CISA Accredited IS Security Auditing Consulting Services
The Certified Information Systems Auditor accreditation is a globally recognized qualification that indicates expertise in network security auditing. Certified by ANSI, the CISA credential requires that candidates pass a comprehensive test administered by the ISACA international professional association. Progent's CISA-qualified security audit engineers can assist your company in the areas of:

  • Information Systems Audit Process
  • IT Governance
  • Network Assets and Infrastructure Planned Useful Life
  • Information Technology Support
  • Protecting Information Resources
  • Disaster Recovery Preparedness
Learn more details about Progent's CISA Certified Information System Security Auditing Consulting Assistance.

Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA in 2010 to verify a consultant's ability to design, deploy, and support information system controls to mitigate network risk. Progent offers the services of a CRISC-certified engineer to assist your company to develop and execute a workplace continuity plan based on industry best practices identified by CRISC and crafted to align with your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC IT risk management experts offer a range of risk evaluation services such as:

  • Collect data and review documentation to evaluate significant risk scenarios
  • Inventory legal, regulatory, and contractual mandates and organizational standards related to your network to determine their potential impact on your strategic goals
  • Identify potential threats for your business processes to assist in analyzing your enterprise risk
  • Create a risk awareness program and conduct seminars to ensure your stakeholders appreciate IS risk so they can contribute to your risk control process
  • Connect key risk vectors to related operational processes to help determine risk ownership
  • Determine risk tolerance with executive management and key stakeholders to make sure they match
Read additional information about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Qualified Information System Security Consulting Services
GIAC (Global Information Assurance Certification) was established in 1999 to certify the knowledge of network security engineers. GIAC's goal is to ensure that a certified professional possesses the knowledge needed to deliver services in key areas of system, data, and application security. GIAC certifications are recognized by companies and institutions around the world including and the U.S. National Security Agency (NSA). Progent's GIAC-qualified IS security audit specialists can assist your company with:

Learn additional details about Progent's GIAC Information Assurance Expertise.

Contact a Progent Security Engineer
To learn how to access a security consultant for remote or on-premises help in Alabama, phone 1-800-993-9400 or visit Online Network Help.