Company IT networks in the state of Alabama can now get fast and affordable remote help from Progent's qualified network security consultants to assist with urgent security issues. The cost is competitive, charges are by the minute, sign-up is immediate, and service is world class. Progent also offers assistance for long-term engagements that requires the expertise of senior security consultants with high-level industry certifications.

In case your Alabama business is located away from more populated urban neighborhoods like Birmingham, Birmingham, Mobile, or Huntsville, access to nearby accredited network security engineers is often limited when there's an emergency. This could mean a drop in income for your company, upset customers, idle employees, and distracted executives. By calling Progent, you have access to a Certified security consultant who can provide help whenever you have to have it to get your network operating and restore your information.

Progent can assist you in a variety of ways in your efforts to protect your network with services that can range from security assessments to developing a company-wide security strategy. Progent provides affordable support to assist companies of any size to set up and maintain secure networks based on Windows and Cisco technology and that can include servers and desktops running UNIX, Linux, Sun Solaris, or Mac OS X platforms as well as mobile users with Apple handhelds or Google Android or Windows Phone handsets.

Progent can also show you how to outsource spam filtering and defense against email-borne security threats. Email Guard is Progent's email security solution that uses the technology of leading information security companies to provide web-based control and world-class security for all your inbound and outbound email. The powerful architecture of Progent's Email Guard combines a Cloud Protection Layer with a local security gateway device to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. ProSight Email Guard's cloud filter acts as a first line of defense and blocks the vast majority of threats from making it to your network firewall. This reduces your vulnerability to external threats and saves network bandwidth and storage. ProSight Email Guard's on-premises gateway appliance provides a deeper layer of inspection for incoming email. For outgoing email, the local gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and encryption. The on-premises security gateway can also help Exchange Server to track and safeguard internal email traffic that stays inside your corporate firewall.

Progent's certified experts are accessible remotely or on premises to provide a variety of urgent or project-based network security services which include:

If your business has an emergency requirement for IT security help, go to Progent's Emergency Remote Technical Help.

Progent's support professionals provide world-class services in key areas of system protection including security assessment, firewalls and VPN, and high-level security planning.

System Assessment
Progent's certified security consultants can evaluate the vulnerability of your current computer security implementation through exhaustive remote automated testing via sophisticated software tools and proven techniques. Progent's skill in administering this testing saves your company money and assures an accurate portrayal of weaknesses. The information your company gains can be used as the basis of a network protection strategy that will permit your network to run dependably and react quickly to new threats.

Automated Network Vulnerability Analysis
Progent provides expertise in the application of security testing packages such as Microsoft's MBSA and GFI LANguard NSS for economically running a set of automatic network auditing checks to uncover possible security holes. Progent has broad knowledge of other network analysis utilities including NMAP, AMAP Application Scanner, eEye, plus utilities such as Metasploit Framework, Hydra, and Nikto. Progent can help you to understand audit reports and react appropriately.

Progent can show you how to build protection into your company operations, install auditing applications, define and deploy a secure system architecture, and recommend policies to maximize the security of your network. Progent's security professionals are available to show you how to configure a firewall, implement secure remote connectivity to email and data, and integrate VPN. Find out additional information about Progent's network security audits.

Security Inventory Service Bundles for Small Businesses
Progent has put together two ultra-affordable security inventory bundles intended to allow small businesses to get an impartial network security evaluation from a qualified security specialist. With Progent's External Network Security Inventory Scan, a security engineer runs an extensive test of your network from outside your firewall to determine potential weaknesses in the security profile you expose to the public. With Progent's Internal Network Security Inventory Scan, a security expert runs a network scan from a secure computer within your company firewall to evaluate the risk to internal assaults. The two security inventory packages are configured and run from a secured external site. The process is managed by a consultant with high-level security accreditations and who produces a document that summarizes and analyzes the information collected by the security scan and suggests cost-effective remediation if called for.

Stealth Penetration Testing Support Services
Stealth penetration testing is an important part of any successful IT system security plan. Progentís security experts can run thorough intrusion checks without the awareness of your company's internal IT resources. Unannounced penetration testing shows whether current security monitoring tools such as intrusion detection warnings and event history analysis are properly configured and actively monitored. Learn more about Progent's stealth penetration analysis support services.

Firewall and Virtual Private Network Support
Progent's background in security solutions includes in-depth field work with major firewalls and VPN products from a variety of vendors including Cisco, Microsoft, and Juniper. Progent can provide the support of engineers with important networking accreditations such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Debugging
The latest generation of Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver significantly more value than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX firewalls for all new deployments. Following Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the market's most popular network intrusion protection system (IPS). Firepower services provide powerful new features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-premier CCIE network experts can help you to manage your current PIX or Cisco ASA 5500 security appliances or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist you to design, configure, tune, manage and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Find out more details about Cisco ASA 5500-X Firewalls with Firepower configuration and debugging support.

Cisco Security and VPN Consulting Expertise
Cisco's network security and remote access technology represent a comprehensive range of easy-to-administer security solutions to help safeguard your local and remote network infrastructure. Cisco's VPN line includes switches, firewalls, intrusion detection devices and VPN appliances. Progent's professional consulting staff includes field-proven specialists with Cisco CCIE and CCNP certifications who can help your company to select Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that fit best with your company objectives. Find out additional information about Progent's Engineering Expertise for Cisco Security and Virtual Private Network Products.

Support Services for Additional Firewall and VPN Technology
Progent offers small and medium size businesses expert consulting for Intrusion Protection products and IPsec VPN solutions from major firewall and Virtual Private Network security vendors such as Check Point Software, Juniper, and SonicWALL. Progent can help you design a detailed security plan and choose the right technologies from a variety of vendors to support your security objectives while staying within your budget restraints.

Progent's Low-Cost Managed Services for Information Security
Progent's affordable ProSight line of outsourced network management services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance. ProSight managed services offered by Progent include:

ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates cutting edge behavior-based machine learning technology to defend endpoint devices as well as physical and virtual servers against new malware attacks such as ransomware and email phishing, which routinely evade traditional signature-matching anti-virus products. ProSight Active Security Monitoring safeguards local and cloud resources and provides a single platform to address the entire malware attack lifecycle including blocking, infiltration detection, mitigation, remediation, and forensics. Key capabilities include single-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection managed services offer affordable in-depth protection for physical servers and VMs, desktops, smartphones, and Exchange Server. ProSight ESP utilizes adaptive security and modern behavior analysis for continuously monitoring and responding to cyber threats from all vectors. ProSight ESP provides firewall protection, penetration alerts, endpoint management, and web filtering via cutting-edge technologies packaged within a single agent accessible from a unified control. Progent's data protection and virtualization experts can assist you to design and implement a ProSight ESP deployment that meets your company's unique needs and that allows you prove compliance with government and industry information protection regulations. Progent will help you specify and implement policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alarms that require urgent action. Progent's consultants can also help your company to install and verify a backup and disaster recovery solution such as ProSight Data Protection Services so you can get back in business rapidly from a destructive cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Exchange email filtering.

ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent offer small and medium-sized businesses a low cost and fully managed solution for secure backup/disaster recovery. For a fixed monthly cost, ProSight DPS automates and monitors your backup processes and allows rapid restoration of critical data, apps and VMs that have become lost or corrupted as a result of hardware failures, software bugs, disasters, human error, or malware attacks like ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images, plus Hyper-V and VMware images/. Important data can be protected on the cloud, to a local storage device, or to both. Progent's cloud backup consultants can provide world-class expertise to set up ProSight Data Protection Services to to comply with government and industry regulatory standards like HIPPA, FINRA, PCI and Safe Harbor and, whenever necessary, can help you to recover your business-critical data. Find out more about ProSight Data Protection Services Managed Backup.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the infrastructure of top data security companies to provide centralized control and world-class protection for your email traffic. The hybrid architecture of Progent's Email Guard managed service combines a Cloud Protection Layer with an on-premises gateway appliance to provide complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne malware. Email Guard's Cloud Protection Layer serves as a first line of defense and keeps the vast majority of unwanted email from making it to your security perimeter. This decreases your vulnerability to external threats and saves system bandwidth and storage space. Email Guard's on-premises gateway appliance adds a deeper level of analysis for inbound email. For outbound email, the local gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also help Exchange Server to monitor and safeguard internal email traffic that stays within your corporate firewall. For more details, see ProSight Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and applications hosted in a secure Tier III data center on a fast virtual machine host configured and maintained by Progent's IT support professionals. Under Progent's ProSight Virtual Hosting service model, the client owns the data, the operating system software, and the applications. Since the environment is virtualized, it can be ported immediately to a different hardware environment without requiring a lengthy and technically risky configuration procedure. With ProSight Virtual Hosting, your business is not locked into a single hosting service. Find out more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, update, find and protect information related to your IT infrastructure, processes, applications, and services. You can quickly locate passwords or serial numbers and be alerted automatically about impending expirations of SSL certificates or domains. By updating and organizing your IT documentation, you can save as much as half of time thrown away searching for critical information about your IT network. ProSight IT Asset Management includes a common repository for holding and collaborating on all documents related to managing your network infrastructure such as recommended procedures and How-To's. ProSight IT Asset Management also offers advanced automation for gathering and associating IT data. Whether youíre planning improvements, doing regular maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the knowledge you require as soon as you need it. Find out more details about ProSight IT Asset Management service.

Certified Security Design
Any company ought to have a carefully considered security program that includes both preventive procedures and reaction planning. The pre-attack plan is a collection of steps designed to reduce security weaknesses. The reactive strategy helps your company's network security personnel to evaluate the damage caused by a security penetration, repair the network, record the event, and get the IT network running as rapidly as feasible.

Progent's expert IS security consultants are available to assist your company to perform a full vulnerability assessment and create a company-wide security plan to implement security processes and mechanisms to reduce ongoing attacks and threats.

CISM Qualified Network Security Engineering Assistance
The CISM organization describes the basic competencies and worldwide standards of performance that IT security professionals are expected to master. CISM gives executive management the assurance that those who have qualified for their CISM certification have the experience and knowledge to deliver effective security administration and support consulting. Progent can provide the expertise of CISM Premier security consultants to assist businesses with:

  • IS Security Strategies
  • Risk Management
  • Network Security Implementation Management
  • IS Security Administration
  • Response Management
Find out more details about Progent's CISM Security Consulting Services.

CISSP Qualified Security Engineering Support
CISSP denotes expertise with an international standard for data security. ANSI (American National Standards Institute) has granted the CISSP credential accreditation in the area of information protection defined by ISO/IEC 17024. Progent offers access to of security professionals who have qualified for CISSP certification. Progent can give you access to a CISSP-certified professional to help your enterprise in a variety security areas including:

  • Security Administration Practices
  • Security Architecture and Models
  • Access Control Systems and Methodology
  • Applications Development Security
  • Secure Operations
  • Physical Security
  • Encryption/Decryption Mechanisms
  • Telecom, Network and Internet Security
  • Disaster Recovery Planning
Learn more information about Progent's CISSP Accredited Information Security Consulting Services.

CISSP-ISSAP Accredited Secure Network Architecture Engineering Expertise
Progent's CISSP-ISSAP Certified network architecture engineers are consultants who have been awarded ISSAP status through rigorous testing and extensive work with information security architecture. The ISSAP certification indicates proven competence in the more in-depth demands of information system security architecture bounded by the wider scope of IS security knowledge needed for CISSP certification. Progent's ISSAP-premier security specialists can help your company with all phases of secure network architecture such as.

  • Access Management Mechanisms and Methodologies
  • Phone System and Network Security
  • Cryptography Solutions
  • Requirements Analysis and Security Standards
  • BCP and Disaster Recovery Planning (DRP)
  • Physical Security
Learn more details about Progent's ISSAP Qualified Secure IT Architecture Consulting Services.

CISA Accredited Information System Security Auditing Consulting Expertise
The Certified Information Systems Auditor (CISA) accreditation is a prestigious achievement that indicates expertise in network security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA credential requires that consultants undergo an extensive examination administered by the ISACA professional association. Progent's CISA-qualified information security audit specialists are available to help your company in the areas of:

  • Information Systems Audit Process
  • IT Administration
  • Network Assets and Architecture Planned Useful Life
  • IT Support
  • Protecting Data Assets
  • Business Continuity Preparedness
Get additional details concerning Progent's CISA Qualified Network Security Auditing Consulting Expertise.

CRISC Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA to verify an IT professional's ability to plan, deploy, and support IS control mechanisms to mitigate network risk. Progent offers the expertise of a CRISC-certified consultant to assist you to develop and carry out a business continuity or disaster recovery plan that follows industry best practices promoted by CRISC and crafted to align with your organization's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC-certified network risk management engineers can provide a range of risk identification services including:

  • Collect data and review documentation to evaluate significant vulnerabilities
  • Identify legal, regulatory, and contractual mandates and company policies associated with your network to determine their potential influence on your business objectives
  • Point out potential threats for your business processes to assist in evaluating your corporate risk
  • Develop a risk awareness program and conduct seminars to ensure your organization appreciate information system risk so they can contribute to your risk management program
  • Connect identified risk vectors to related operational processes to help assign risk responsibility
  • Determine risk tolerance with your senior leadership and key stakeholders to make sure they match
Learn more details concerning Progent's CRISC Risk Management Experts.

GIAC Accredited Network Security Engineering Assistance
Global Information Assurance Certification was founded in 1999 to certify the knowledge of information technology security experts. GIAC's goal is to assure that a certified professional possesses the knowledge needed to provide support in vital categories of network, information, and application program security. GIAC accreditations are recognized by companies and institutions throughout the world including and the United States National Security Agency. Progent's GIAC-certified IS security audit specialists can assist your business with:

  • Assessing Networks
  • Security Incident Handling
  • Intrusion Detection
  • Web-based Application Security
  • SIEM solutions
Read more details concerning Progent's GIAC Information Assurance Support.

Contact a Progent Security Expert
To learn how to access a certified Progent security engineer for remote or onsite assistance in Alabama, call 1-800-993-9400 or go to Online Computer Support.