Business information networks in the state ofAlabamanow have quick and affordable remote access to Progent's qualified security consultants to help with critical security issues. The cost is reasonable, charges are per minute, sign-up is immediate, and service is unbeatable. Progent also provides help for long-term projects that requires the services of senior security consultants with high-level industry credentials.
If yourAlabamacompany is far from more populated urban neighborhoods such asBirmingham, Birmingham, Mobile, or Huntsville, the availability of local qualified network security professionals is often problematic when you have a security disaster. This can cause a loss of revenue for your business, angry clients, unproductive employees, and defocused executives. By contacting Progent's remote support, you have access to a Premier security engineer ready to offer help when you have to have it to get your network operating and recover your information.
Progent can help you at any level in your efforts to defend your network with services ranging from security assessments to creating a company-wide security plan. Progent offers affordable support to help small and midsize companies to set up and manage secure networks powered by Microsoft Windows and Cisco technology and that can include servers and desktops based on UNIX, Linux, Sun Solaris, or Mac OS X platforms plus mobile users with Apple iOS handhelds or Google Android or Windows Phone devices.
Progent can also assist you to outsource spam blocking and defense against email-borne assaults. Email Guard is Progent's email security solution that uses the services and infrastructure of leading data security vendors to provide centralized control and world-class protection for all your email traffic. The powerful structure of Progent's Email Guard integrates a Cloud Protection Layer with a local security gateway appliance to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The Cloud Protection Layer serves as a preliminary barricade and blocks most threats from making it to your network firewall. This decreases your vulnerability to inbound attacks and saves network bandwidth and storage. ProSight Email Guard's onsite gateway device adds a further layer of analysis for incoming email. For outbound email, the local gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also enable Exchange Server to track and safeguard internal email that stays inside your security perimeter.
Progent's security consultants are accessible remotely or on premises to provide a variety of urgent or longer-term IT security services which include:
If your business has an emergency need for IT security support, refer to Progent's Urgent Online Technical Support.
- Perform thorough network security audits
- Clean up rapidly after virus and worm attacks
- Configure firewalls from multiple vendors
- Configure secure solutions for remote and mobile access
- Install advanced utilities for automatic protection against viruses, spam and DHAs
- Help create a company-wide security plan with proactive monitoring
- Offer outsourced Call Center Support
- Create a practical backup and recovery solution built around Data Protection Manager (DPM) backup capability
Progent's consultants provide world-class services in key areas of computer security including auditing, firewalls and VPN, and advanced security consulting.
Progent's certified security consultants can evaluate the effectiveness of your current network security systems by performing exhaustive remote automated analysis via sophisticated software tools and proven procedures. Progent's skill in administering this service saves you money and assures an objective picture of weaknesses. The information your company gains can form the basis of a security plan that will allow your information system to run dependably and adapt rapidly to new risks.
Automated Vulnerability Audits
Progent offers consulting in the use of security evaluation products such as Microsoft Baseline Security Analyzer (MBSA) and LANguard from GFI for economically running a set of programmed system auditing checks to identify possible security vulnerabilities. Progent has extensive experience with other network auditing utilities including NMAP Port Scanner, AMAP application mapper, eEye, plus utilities such as Metasploit, Netcat, Hydra, and Nikto. Progent can help you to make sense of testing reports and respond appropriately.
Progent can show you how to build protection into your business operations, install auditing applications, define and implement a protected network architecture, and recommend procedures to optimize the safety of your IT system. Progent's security consultants are available to assist you to configure a firewall, design secure remote connectivity to email and data, and integrate VPN. Learn additional information on Progent's network security evaluation.
Security Inventory Scanning Bundles for Small Businesses
Progent has put together two ultra-affordable security inventory service bundles intended to allow small businesses to get an objective security assessment from an accredited security engineer. With Progent's External Network Security Inventory Checkup, a security expert administers an extensive examination of your IT infrastructure from beyond your firewall to uncover potential risks in the security profile you expose to the outside world. With Progent's Internal Network Security Inventory Scan, a certified security professional runs a network scan from a secure computer within your firewall to uncover the risk to inside attacks. Both security inventory packages are configured and run from a protected external location. The project is managed by an engineer who has earned top security credentials and who produces a document that details and analyzes the data collected by the scan and proposes practical remediation if appropriate.
Stealth Security Penetration Testing Support Services
Stealth penetration checking is a key part of any serious IT system security plan. Progentís security experts can perform extensive penetration tests without the awareness of your company's internal network support resources. Stealth penetration testing uncovers whether existing security monitoring systems such as intrusion detection alerts and event log analysis are properly configured and consistently monitored. Find out more on Progent's stealth penetration analysis support services.
Progent's background in security solutions includes extensive familiarity with leading firewalls and Virtual Private Network technology from multiple companies such as Cisco, Microsoft, and Juniper. Progent offers the services of consultants with important industry accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Integration and Debugging
The current ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer substantially more value than Cisco's previous firewalls and have replaced the ASA 5500 and PIX 500 firewalls for all new installations. After Cisco's acquisition of Sourcefire, the whole line of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed intrusion protection system. Firepower services provide powerful new features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-premier CCIE network consultants can help your company to manage your legacy PIX or ASA 5500 firewalls or upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your organization to plan, configure, optimize, administer and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Learn more details about Cisco ASA Firewalls with Firepower integration and debugging services.
Cisco Network Security and Virtual Private Network Consulting Services
Cisco's security and remote access products provide a full range of manageable security products to help safeguard your local and remote network infrastructure. Cisco's VPN product family includes switches, firewalls, intrusion detection devices and VPN concentrators. Progent's expert staff of consultants includes field-proven specialists with Cisco Certified Internetwork Expert and Cisco Certified Network Professional qualifications who are able to help your company to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that fit most closely with your company objectives. Find out additional information concerning Progent's Engineering Services for Cisco Security Technology and VPN Appliances.
Consulting Services for Other Firewall and Virtual Private Network Technology
Progent offers small and medium size organizations professional consulting for Intrusion Protection products and IPsec VPN products from leading firewall and Virtual Private Network security vendors such as Check Point Software, Juniper, and SonicWall. Progent can show you how to create a comprehensive security strategy and choose appropriate technologies from a variety of vendors to achieve your security goals while staying within your spending restraints.
Progent's Flat-rate Managed Services for Information Security
Progent's affordable ProSight series of managed services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes cutting edge behavior-based machine learning tools to guard endpoints as well as physical and virtual servers against modern malware attacks such as ransomware and file-less exploits, which easily evade traditional signature-based anti-virus products. ProSight Active Security Monitoring protects on-premises and cloud-based resources and provides a unified platform to address the entire malware attack lifecycle including protection, identification, mitigation, remediation, and forensics. Top features include one-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against newly discovered attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Endpoint Security
ProSight Enhanced Security Protection (ESP) managed services deliver affordable multi-layer security for physical servers and VMs, workstations, smartphones, and Microsoft Exchange. ProSight ESP uses adaptive security and advanced machine learning for continuously monitoring and responding to security threats from all attack vectors. ProSight ESP delivers two-way firewall protection, intrusion alerts, device management, and web filtering via cutting-edge tools packaged within a single agent accessible from a single console. Progent's security and virtualization experts can assist you to plan and implement a ProSight ESP deployment that meets your company's unique requirements and that allows you achieve and demonstrate compliance with legal and industry data protection standards. Progent will help you define and implement security policies that ProSight ESP will enforce, and Progent will monitor your network and react to alarms that require immediate attention. Progent can also assist you to set up and test a backup and restore solution like ProSight Data Protection Services so you can recover quickly from a destructive security attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Exchange email filtering.
ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services offer small and medium-sized businesses a low cost and fully managed service for secure backup/disaster recovery. Available at a fixed monthly cost, ProSight DPS automates your backup processes and allows fast restoration of critical data, applications and VMs that have become lost or damaged as a result of component failures, software bugs, natural disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, applications, system images, plus Hyper-V and VMware images/. Critical data can be backed up on the cloud, to an on-promises device, or to both. Progent's backup and recovery consultants can provide world-class expertise to set up ProSight DPS to be compliant with regulatory requirements like HIPAA, FIRPA, and PCI and, when necessary, can help you to recover your critical data. Find out more about ProSight DPS Managed Backup and Recovery.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the technology of leading information security companies to provide centralized management and comprehensive protection for all your inbound and outbound email. The powerful structure of Progent's Email Guard combines cloud-based filtering with an on-premises gateway appliance to offer advanced defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-based malware. Email Guard's cloud filter acts as a preliminary barricade and blocks the vast majority of threats from reaching your network firewall. This decreases your exposure to external attacks and conserves system bandwidth and storage. Email Guard's on-premises security gateway appliance provides a deeper layer of inspection for incoming email. For outbound email, the onsite security gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also assist Microsoft Exchange Server to monitor and protect internal email that stays within your corporate firewall. For more information, visit ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and apps hosted in a secure fault tolerant data center on a high-performance virtual machine host configured and maintained by Progent's network support experts. With the ProSight Virtual Hosting model, the client retains ownership of the data, the OS software, and the apps. Because the system is virtualized, it can be ported immediately to a different hardware environment without a lengthy and technically risky reinstallation process. With ProSight Virtual Hosting, you are not tied a single hosting service. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, update, find and protect information about your network infrastructure, procedures, business apps, and services. You can quickly find passwords or serial numbers and be warned automatically about impending expirations of SSL certificates or domains. By updating and organizing your IT documentation, you can eliminate as much as half of time wasted looking for critical information about your network. ProSight IT Asset Management features a centralized location for holding and collaborating on all documents required for managing your network infrastructure such as standard operating procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for gathering and associating IT information. Whether youíre making improvements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the information you need as soon as you need it. Find out more about ProSight IT Asset Management service.
Certified Network Security Design
Any company ought to develop a thoroughly considered security program that incorporates both preventive procedures and response planning. The proactive plan is a set of procedures designed to reduce vulnerabilities. The reactive strategy assists your company's network security engineers to evaluate the damage caused by a security penetration, fix the damage, document the event, and get the IT network operational as quickly as feasible.
Progent's certified information security consultants can to assist your company to perform a full risk assessment and create a network security plan to implement security policies and controls to reduce future attacks and threats.
CISM Certified Information Security Consulting Services
The Certified Information Security Manager (CISM) organization describes the core capabilities and worldwide standards of skill that information security professionals are required to learn. CISM provides business management the assurance that consultants who have qualified for their CISM credential possess the experience and capability to provide efficient security administration and support consulting. Progent offers the support of CISM Premier security consultants to help businesses with:
Find out additional information concerning Progent's CISM Certified Network Security Engineering Services.
- IS Security Processes
- Vulnerability Management
- Network Security Implementation Management
- Information Security Administration
- Response Planning
CISSP Qualified Security Engineering Assistance
CISSP certification denotes expertise with a global standard for data security. ANSI has granted the CISSP credential recognition in the field of information protection stipulated by ISO/IEC 17024. Progent can provide access to of security professionals who have earned CISSP accreditation. Progent can provide a CISSP-certified consultant to help your enterprise in a broad range of security fields including:
Find out more information about Progent's CISSP Qualified Cybersecurity Consulting Services.
- Security Administration Procedures
- Security Infrastructure and Paradigms
- Access Control Systems and Processes
- Software Development Security
- Secure Operations
- Site Security
- Data Encryption Technology
- Telecommunications, Network and WAN Security
- Business Continuity Preparedness
CISSP-ISSAP Accredited Secure Information System Architecture Consulting Support
Progent's CISSP-ISSAP Certified network architecture engineers are consultants who have earned ISSAP status as a result of rigorous testing and significant work with information security design. The Information System Security Architecture Professional (ISSAP) certification represents proven competence in the more in-depth demands of IS security architecture bounded by the broader scope of information security expertise required for CISSP accreditation. Progent's ISSAP-certified security specialists can assist your company with all aspects of secure network architecture including.
Learn more details about Progent's ISSAP Accredited Secure System Architecture Engineering Professionals.
- Access Management Mechanisms and Techniques
- Telecom and Network Infrastructure Security
- Cryptography Solutions
- Needs Analysis and Security Criteria
- BCP and Disaster Recovery Planning (DRP)
- Site Security
CISA Certified IS Security Auditing Engineering Expertise
The CISA credential is an important qualification that signifies expertise in information system security auditing. Accredited by ANSI, the CISA accreditation requires that candidates undergo an extensive examination given by the ISACA international professional association. Progent's CISA-qualified security audit consultants are available to help your company in the areas of:
Get more details about Progent's CISA Accredited Network Security Auditing Consulting Services.
- IS Audit Services
- Information Technology Administration
- Systems and Architecture Lifecycle
- Information Technology Service Delivery
- Protecting Data Resources
- Disaster Recovery Planning
Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA in 2010 to validate an IT professional's ability to plan, implement, and support IS control mechanisms to mitigate network risk. Progent offers the expertise of a CRISC-certified engineer to assist your company to create and carry out a business continuity strategy that follows leading practices identified by CRISC and geared to match your organization's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC-certified network risk mitigation consultants offer a range of risk assessment services including:
Read more information concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Gather data and study documentation to help identify significant vulnerabilities
- Identify legal, industry, and contractual requirements and organizational standards related to your network to assess their possible impact on your strategic objectives
- Point out possible vulnerabilities for your business workflows to assist in evaluating your enterprise risk
- Develop a risk awareness initiative and provide seminars to make sure your stakeholders understand IS risk so they can assist with your risk management program
- Connect identified risk vectors to your associated business processes to help determine risk responsibility
- Determine risk appetite with executive management and key stakeholders to ensure they are in agreement
GIAC Qualified Information System Security Engineering Expertise
Read additional information about Progent's GIAC Information Assurance Services.
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the knowledge of computer security engineers. GIAC's goal is to ensure that an accredited security consultant has the knowledge needed to deliver services in key categories of system, data, and software security. GIAC certifications are recognized by companies and institutions all over the world including and the U.S. National Security Agency. Progent's GIAC-qualified security audit specialists are available to help your business with:
Talk to a Certified Security Specialist
To see how you can get in touch with a security engineer for online or on-premises expertise in Alabama, phone 1-800-993-9400 or visit Online Computer Support.