Company computer networks in the state of Alabama can depend on quick and affordable online technical support from Progent's certified network security consultants to help with the toughest security issues. Rates are competitive, charges are by the minute, engagement is immediate, and support is world class. Progent also provides help for long-term projects that demand the knowledge of seasoned security engineers with high-level security credentials.

If your Alabama small business is located some distance from larger urban areas such as Birmingham, Birmingham, Mobile, or Huntsville, the availability of local accredited network security engineers may be limited when there's a security disaster. This can result in a drop in revenue for your company, upset clients, unproductive employees, and defocused management. By calling Progent, you can get in touch with a Premier security consultant who can offer expertise when you have to have it to keep your network running and restore your data.

Progent can assist you in all your efforts to protect your network with support services that can range from security assessments to developing a company-wide security plan. Progent provides economical support to help companies of any size to set up and maintain safe IT environments based on Windows and Cisco products and that may include servers and desktops running UNIX, Linux, Solaris, or Apple Mac OS X operating systems plus BYOD users with Apple handhelds or Google Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam blocking and protection from email-borne assaults. Email Guard is Progent's email filtering and encryption solution that incorporates the services and infrastructure of top information security companies to provide centralized control and world-class security for all your inbound and outbound email. The hybrid architecture of Email Guard managed service combines cloud-based filtering with an on-premises security gateway device to offer complete protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne malware. ProSight Email Guard's Cloud Protection Layer serves as a preliminary barricade and blocks the vast majority of unwanted email from reaching your network firewall. This decreases your vulnerability to inbound threats and conserves network bandwidth and storage. ProSight Email Guard's on-premises gateway device adds a further layer of inspection for inbound email. For outgoing email, the on-premises gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also help Microsoft Exchange Server to track and protect internal email that stays within your corporate firewall.

Progent's certified experts are accessible online or on site to provide a range of emergency or longer-term computer security services such as:

If your business has an immediate need for computer security help, go to Progent's Emergency Remote Network Help.

Progent's security experts offer world-class support in key facets of computer protection including security evaluation, firewall and VPN expertise, and high-level security planning.

System Audits
Progent's expert security engineers can evaluate the effectiveness of your current computer security environment by performing exhaustive remote automated analysis based on advanced utilities and tested techniques. Progent's skill in administering this service saves you money and offers a detailed picture of gaps. The knowledge your company is provided can form the basis of a security plan that will permit your network to operate dependably and adapt rapidly to new risks.

Automated Vulnerability Audits
Progent offers expertise in the application of security auditing packages such as Microsoft Baseline Security Analyzer and GFI LANguard Network Security Scanner for economically performing a variety of programmed network auditing checks to identify possible security weaknesses. Progent has extensive experience with additional security analysis tools including NMAP Port Scanner, AMAP Application Scanner, eEye, as well as utilities such as Metasploit Framework, Netcat, and Nikto. Progent can help you to make sense of audit reports and respond effectively.

Progent can help you design protection into your business operations, install scanning software, plan and implement a protected system environment, and suggest procedures to optimize the security of your IT system. Progent's security professionals are ready to help you set up a firewall, design secure remote connectivity to email and business applications, and integrate virtual private network. Learn additional information on Progent's automated security audits.

Security Inventory Bundles for Small Businesses
Progent has put together two ultra-affordable security inventory packages intended to allow small companies to receive an impartial security assessment from an accredited security expert. With Progent's External Security Inventory Scan, a security engineer runs an extensive test of your IT infrastructure from outside your firewall to determine potential risks in the security profile you present to the public. With Progent's Internal Security Inventory Scan, a security engineer runs a system scan from a secure machine within your firewall to uncover your exposure to inside threats. The two security inventory services are set up and executed from a protected remote site. The process is managed by an engineer who has earned high-level security credentials and who generates a document that details and analyzes the data collected by the scan and suggests practical remediation where appropriate.

Stealth Penetration Analysis Consulting
Stealth intrusion checking is an important part of any successful IT system security strategy. Progentís security professionals can perform thorough intrusion tests without the knowledge of your organization's internal network support staff. Stealth penetration testing uncovers whether existing security monitoring systems such as intrusion incident warnings and event log monitoring are correctly configured and actively monitored. Find out additional information concerning Progent's stealth security penetration testing support services.

Firewall And Virtual Private Network (VPN) Solutions
Progent's background in security technology encompasses extensive familiarity with major firewalls and Virtual Private Network technology from a variety of companies such as Cisco, Microsoft, and Juniper. Progent can provide the support of consultants with key industry certifications including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Debugging
The latest generation of Cisco ASA 5500-X Series of firewalls with Firepower Services provide significantly more bang for the buck than Cisco's previous firewalls and have replaced the ASA 5500 and PIX 500 security appliances for all new installations. Since Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort technology, which is the market's most popular network intrusion protection system (IPS). Firepower services provide powerful new features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist you to manage your current PIX or ASA 5500 firewalls and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your business to design, deploy, tune, administer and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. See more details about Cisco ASA 5500-X Firewalls with Firepower Services configuration and troubleshooting services.

Cisco Security and Virtual Private Network Consulting Expertise
Cisco's security and offsite access products provide a complete line of easy-to-administer security products to help safeguard your wired and wireless information system. Cisco's Virtual Private Network product family includes routers, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's expert consulting staff includes experienced engineers with Cisco's CCIE and Cisco Certified Network Professional certifications who can help your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that align best with your company goals. Read more information concerning Progent's Consulting Services for Cisco Security Technology and Virtual Private Network Products.

Support Expertise for Additional Firewall and VPN Solutions
Progent offers small and mid-size companies professional consulting for Intrusion Protection products and IPsec VPN solutions from leading firewall and Virtual Private Network security vendors such as Check Point Software, Juniper Networks, and SonicWALL. Progent can show you how to create a comprehensive security strategy and choose the right products from a variety of suppliers to achieve your security goals while staying within your budget limits.

Progent's Low-Cost Managed Services for Information Assurance
Progent's low-cost ProSight family of outsourced network management services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. ProSight managed services available from Progent include:

ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates next generation behavior-based analysis tools to defend endpoint devices and physical and virtual servers against modern malware assaults like ransomware and file-less exploits, which routinely evade traditional signature-matching AV tools. ProSight ASM safeguards local and cloud resources and provides a single platform to manage the complete threat lifecycle including filtering, detection, containment, remediation, and forensics. Top capabilities include one-click rollback with Windows VSS and automatic network-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
ProSight Enhanced Security Protection managed services offer economical multi-layer protection for physical servers and VMs, desktops, mobile devices, and Exchange email. ProSight ESP utilizes adaptive security and advanced heuristics for continuously monitoring and reacting to cyber assaults from all vectors. ProSight ESP delivers two-way firewall protection, penetration alarms, endpoint management, and web filtering via leading-edge technologies packaged within one agent managed from a single control. Progent's data protection and virtualization consultants can assist your business to plan and implement a ProSight ESP environment that meets your company's specific needs and that allows you achieve and demonstrate compliance with legal and industry information security standards. Progent will help you specify and implement security policies that ProSight ESP will manage, and Progent will monitor your network and respond to alerts that require immediate attention. Progent can also assist your company to set up and test a backup and disaster recovery solution like ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Microsoft Exchange email filtering.

ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services from Progent offer small and mid-sized businesses an affordable and fully managed solution for secure backup/disaster recovery (BDR). For a low monthly rate, ProSight Data Protection Services automates your backup processes and enables fast recovery of vital files, apps and virtual machines that have become lost or corrupted as a result of hardware failures, software glitches, disasters, human error, or malware attacks like ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware images/. Critical data can be protected on the cloud, to a local device, or to both. Progent's cloud backup consultants can deliver world-class expertise to set up ProSight Data Protection Services to be compliant with government and industry regulatory requirements such as HIPPA, FINRA, and PCI and, when needed, can assist you to recover your business-critical information. Find out more about ProSight Data Protection Services Managed Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the technology of top data security companies to deliver centralized control and comprehensive protection for your email traffic. The powerful structure of Progent's Email Guard managed service combines a Cloud Protection Layer with a local gateway device to offer complete defense against spam, viruses, Dos Attacks, DHAs, and other email-borne threats. The Cloud Protection Layer serves as a preliminary barricade and blocks most threats from making it to your security perimeter. This reduces your vulnerability to inbound threats and conserves network bandwidth and storage space. Email Guard's onsite security gateway device adds a deeper level of analysis for incoming email. For outbound email, the on-premises security gateway offers AV and anti-spam protection, DLP, and email encryption. The onsite gateway can also help Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends inside your security perimeter. For more information, visit ProSight Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and applications hosted in a protected fault tolerant data center on a fast virtual machine host set up and maintained by Progent's network support experts. With Progent's ProSight Virtual Hosting model, the customer retains ownership of the data, the OS platforms, and the applications. Since the environment is virtualized, it can be moved easily to an alternate hosting environment without requiring a time-consuming and difficult reinstallation procedure. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Find out more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, maintain, find and safeguard data related to your IT infrastructure, procedures, applications, and services. You can quickly find passwords or IP addresses and be warned about upcoming expirations of SSL certificates or warranties. By updating and managing your IT infrastructure documentation, you can eliminate up to half of time thrown away trying to find vital information about your network. ProSight IT Asset Management includes a common repository for storing and collaborating on all documents required for managing your business network such as recommended procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for gathering and relating IT data. Whether youíre making improvements, doing regular maintenance, or responding to an emergency, ProSight IT Asset Management gets you the information you need the instant you need it. Learn more details about ProSight IT Asset Management service.

Expert Network Security Design
Every company should develop a thoroughly considered security program that incorporates both proactive procedures and reaction plans. The proactive plan is a collection of procedures that help to minimize vulnerabilities. The reactive plan assists your company's security engineers to evaluate the damage caused by a security penetration, repair the network, document the event, and get business functions operational as soon as possible.

Progent's certified information security engineers can to help your company to perform a comprehensive risk assessment and create a network security plan to establish security policies and controls to reduce ongoing assaults and dangers.

CISM Certified Security Support Services
The Certified Information Security Manager (CISM) organization describes the basic competencies and worldwide standards of skill that information security professionals are required to master. It provides business management the confidence that consultants who have qualified for their CISM credential have the experience and knowledge to deliver effective security administration and consulting consulting. Progent can provide the services of CISM Certified security professionals to help businesses with:

  • Information Security Strategies
  • Risk Management
  • IS Security Implementation Management
  • IS Security Administration
  • Recovery Management
Learn additional details concerning Progent's CISM Certified Information Security Support Services.

CISSP Certified Security Engineering Services
CISSP recognizes mastery of an international standard for data security. The American National Standards Institute has awarded certification accreditation in the area of data security defined by ISO 17024. Progent offers the services of security experts who have qualified for CISSP certification. Progent can provide a CISSP-certified professional to help your company in a variety security areas such as:

  • Security Administration Procedures
  • Security Architecture and Models
  • Access Control Solutions and Processes
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Encryption/Decryption Mechanisms
  • Telecommunications, LAN and WAN Security
  • Business Continuity Planning
Find out additional details concerning Progent's CISSP Information Security Support Expertise.

CISSP-ISSAP Qualified Secure Information System Architecture Engineering Expertise
Progent's CISSP-ISSAP Premier system architecture professionals are experts who have earned ISSAP status as a result of rigorous testing and significant experience with network security design. The Information System Security Architecture Professional (ISSAP) credential represents proven competence in the more challenging demands of information security architecture within the wider scope of information security expertise required for CISSP accreditation. Progent's ISSAP-premier security specialists can help your company with all aspects of architecture security such as.

  • Access Management Systems and Techniques
  • Telecom and System Infrastructure Security
  • Data Encryption Options
  • Requirements Evaluation and Security Criteria
  • Business Continuity Planning and DRP
  • Hardware Security
Find out additional details concerning Progent's ISSAP Accredited Secure Information System Architecture Support Expertise.

CISA Accredited Information System Security Auditing Engineering Expertise
The Certified Information Systems Auditor (CISA) credential is a recognized qualification that represents expertise in IS security auditing. Certified by the American National Standards Institute, the CISA accreditation requires that consultants pass a comprehensive test given by the ISACA professional association. Progent's CISA-qualified network security audit consultants are available to help your company with:

  • Information Systems Audit Process
  • IT Governance
  • Systems and Architecture Planned Useful Life
  • Information Technology Support
  • Safeguarding Data Assets
  • Business Continuity Planning
Get the details about Progent's CISA Accredited Network Security Auditing Engineering Assistance.

CRISC Experts
The CRISC certification program was initiated by ISACA to validate a consultant's skills to plan, deploy, and maintain IS control mechanisms to mitigate network risk. Progent offers the services of a CRISC-certified engineer to help you to develop and carry out a workplace continuity plan based on industry best practices promoted by CRISC and crafted to match your organization's risk appetite, business goals, and budgetary guidelines. Progent's CRISC network risk mitigation specialists offer a variety of risk evaluation services such as:

  • Gather information and review documentation to help identify major risk scenarios
  • Identify statutory, industry, and contractual mandates and organizational policies associated with your network to determine their possible influence on your business goals
  • Point out possible vulnerabilities for your operational processes to assist in evaluating your enterprise risk
  • Develop a risk awareness program and provide training to ensure your stakeholders appreciate IS risk so they can assist with your risk management program
  • Connect key risk vectors to related business procedures to help assign risk responsibility
  • Determine risk appetite with your senior management and key stakeholders to ensure they match
Get the details concerning Progent's CRISC Risk Management Consultants.

GIAC Accredited Security Consulting Expertise
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the skill of information technology security engineers. GIAC's mission is to ensure that a certified professional has the skills appropriate to deliver services in critical categories of network, information, and application program security. GIAC accreditations are recognized by companies and institutions throughout the world including and the U.S. NSA. Progent's GIAC-certified network security audit experts are available to help your company in the areas of:

  • Assessing Perimeters
  • Incident Response
  • Traffic Analysis
  • Web-based Services Security
  • SIEM solutions
Read additional information about Progent's GIAC Information Assurance Services.

Get in Touch with a Security Engineer
To find out how you can contact a certified Progent security consultant for remote or onsite expertise in Alabama, call 1-800-993-9400 or go to Online Network Help.