Small business networks in Arizona now have prompt and affordable remote access to Progent's accredited security engineers to assist with complex security problems. Rates are affordable, charges are by the minute, engagement is immediate, and service is unbeatable. Progent also offers help for complex projects that requires the services of senior security engineers with high-level security credentials.

In case your Arizona office is situated far from more populated metropolitan areas such as Phoenix, Tucson, Mesa, or Glendale, contact with local qualified security consultants is often problematic when you have an urgent situation. This can cause lost productivity for your business, upset clients, idle workers, and distracted executives. By utilizing Progent's remote support, you can get in touch with a Premier security consultant who can deliver assistance whenever you need it to get your system operating and recover your data.

Progent can help you in a variety of ways in your initiatives to protect your IT environment with support services ranging from network security audits to creating a company-wide security strategy. Progent offers affordable support to help small and midsize companies to set up and maintain secure networks powered by Windows and Cisco products and that can include computers based on UNIX or Linux operating systems as well as mobile clients with Apple handhelds or Google Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam filtering and defense against email-borne security threats. Email Guard is Progent's email filtering and encryption solution that incorporates the services and infrastructure of top information security vendors to deliver centralized management and comprehensive protection for your inbound and outbound email. The powerful structure of Email Guard managed service combines a Cloud Protection Layer with a local security gateway appliance to provide complete defense against spam, viruses, Dos Attacks, DHAs, and other email-based malware. ProSight Email Guard's cloud filter serves as a preliminary barricade and blocks the vast majority of threats from reaching your security perimeter. This reduces your vulnerability to external threats and saves network bandwidth and storage space. ProSight Email Guard's onsite gateway appliance provides a further layer of inspection for inbound email. For outgoing email, the local security gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and encryption. The onsite gateway can also help Exchange Server to track and protect internal email traffic that stays within your security perimeter.

Progent's certified engineers are accessible online or in person to offer a range of urgent or project-based network security services including:

  • Perform extensive security audits
  • Clean up promptly after virus and worm attacks
  • Configure and troubleshoot firewalls
  • Configure secure methods for remote and mobile access
  • Deploy advanced software for automatic protection against viruses, spam and directory harvest attacks
  • Help create a comprehensive security plan with 24x7 monitoring
  • Provide outsourced Call Center Support
  • Develop a practical backup and restore strategy built around System Center Data Protection Manager backup/restore technology
If your network has an urgent need for computer security help, refer to Progent's Emergency Remote Network Support.

Progent's support professionals offer world-class support in vital areas of network security that include analysis, firewall and VPN expertise, and advanced security planning.

System Security Assessment
Progent's certified security consultants can evaluate the effectiveness of your current computer protection environment by performing exhaustive remote automated testing via sophisticated software tools and tested techniques. Progent's experience in this testing saves your company consulting fees and assures an objective picture of security holes. The information your company gains can be used as the foundation of a security plan that will allow your network to operate dependably and respond quickly to future threats.

Automated Vulnerability Assessment
Progent provides consulting in the application of security testing products such as Microsoft's MBSA and GFI LANguard NSS for economically performing a set of automatic system auditing scans to identify potential security problems. Progent has broad experience with other security analysis utilities such as NMAP, AMAP Application Scanner, eEye, as well as tools like Metasploit, Netcat, Hydra, and Nikto. Progent can help you to understand audit reports and respond effectively.

Progent can show you how to design protection into your business processes, install scanning applications, plan and deploy a secure network environment, and suggest policies to optimize the security of your network. Progent's security professionals are able to assist you to set up a firewall, implement safe remote access to email and business applications, and integrate VPN. Learn additional information concerning Progent's automated security audits.

Security Inventory Packages for Small Businesses
Progent has put together two ultra-affordable security inventory service packages intended to enable small companies to receive an objective network security assessment from a certified security consultant. With Progent's External Network Security Inventory Checkup, a security expert administers an extensive test of your network from beyond your company firewall to determine possible weaknesses in the security profile you expose to the public. With Progent's Internal Network Security Inventory Checkup, a security engineer executes a network scan from an authorized machine within your firewall to assess vulnerabilities to inside threats. Both security inventory services are configured and executed from a protected remote location. The process is directed by a consultant with high-level security accreditations and who generates a report that details and interprets the data captured by the scan and suggests cost-effective remediation if appropriate.

Network Penetration Analysis Support Services
Stealth penetration testing is an important component of any comprehensive network security strategy. Progentís security experts can run extensive penetration checks without the knowledge of your organization's in-house IT resources. Unannounced penetration testing shows whether current security defense tools such as intrusion detection warnings and event log analysis are properly set up and actively checked. Learn additional information concerning Progent's stealth security penetration testing support services.

Firewall And Virtual Private Network (VPN) Expertise
Progent's background in security solutions includes extensive familiarity with major firewalls and VPN products offered by a variety of companies including Cisco, Microsoft, and Symantec. Progent can provide the services of engineers with important networking certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Configuration and Debugging
The latest generation of Cisco ASA 5500-X Family of firewalls with Firepower Services deliver substantially more value than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new installations. After Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X devices can be configured to enable Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed intrusion protection system. Firepower services provide powerful new features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help your company to manage your current PIX or ASA 5500 security appliances and migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your business to design, deploy, tune, manage and debug firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. See more details about ASA Firewalls with Firepower integration and debugging services.

Cisco Network Security and VPN Engineering Services
Cisco's security and remote access technology represent a full range of easy-to-administer security products to help safeguard your wired and wireless network infrastructure. Cisco's VPN line includes routers, firewalls, intrusion detection systems and VPN concentrators. Progent's professional consulting staff includes field-proven engineers with Cisco Certified Internetwork Expert and Cisco Certified Network Professional certifications who can assist your business to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that align most closely with your business goals. Find out more details concerning Progent's Engineering Services for Cisco Security and Virtual Private Network Appliances.

Engineering Services for Additional Firewall and Virtual Private Network Products
Progent provides small and medium size organizations professional consulting for Intrusion Protection Systems and IPsec VPN products from leading firewall and VPN security vendors including Check Point Software, Juniper, and Symantec. Progent can show you how to create a comprehensive security strategy and choose appropriate technologies from multiple vendors to achieve your security objectives while sticking within your budget limits.

Progent's Fixed-price Managed Services for Information Security
Progent's low-cost ProSight portfolio of network management outsourcing services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. ProSight managed services offered by Progent include:

ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates cutting edge behavior machine learning technology to guard endpoints and servers and VMs against new malware attacks such as ransomware and file-less exploits, which routinely evade traditional signature-based AV products. ProSight ASM protects on-premises and cloud resources and provides a single platform to manage the complete threat progression including protection, detection, containment, remediation, and forensics. Top capabilities include one-click rollback with Windows VSS and real-time system-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.

ProSight Enhanced Security Protection: Unified Endpoint Security
ProSight Enhanced Security Protection managed services offer affordable in-depth protection for physical servers and VMs, desktops, mobile devices, and Microsoft Exchange. ProSight ESP uses adaptive security and advanced machine learning for continuously monitoring and reacting to security threats from all vectors. ProSight ESP offers firewall protection, penetration alerts, device management, and web filtering through cutting-edge tools incorporated within a single agent managed from a single control. Progent's security and virtualization experts can assist your business to design and configure a ProSight ESP deployment that addresses your organization's specific needs and that allows you achieve and demonstrate compliance with legal and industry data protection standards. Progent will assist you specify and implement security policies that ProSight ESP will enforce, and Progent will monitor your network and react to alerts that call for urgent attention. Progent's consultants can also assist your company to set up and test a backup and restore system such as ProSight Data Protection Services so you can get back in business rapidly from a destructive security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Exchange email filtering.

ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services offer small and mid-sized businesses an affordable and fully managed solution for secure backup/disaster recovery (BDR). For a fixed monthly price, ProSight Data Protection Services automates your backup processes and allows fast restoration of critical data, apps and virtual machines that have become unavailable or corrupted due to component failures, software bugs, disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, applications, system images, plus Hyper-V and VMware images/. Important data can be protected on the cloud, to an on-promises storage device, or to both. Progent's cloud backup consultants can provide advanced support to configure ProSight DPS to be compliant with government and industry regulatory standards such as HIPPA, FIRPA, PCI and Safe Harbor and, whenever needed, can assist you to restore your critical data. Find out more about ProSight Data Protection Services Managed Backup and Recovery.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that incorporates the technology of leading data security companies to provide web-based management and comprehensive security for your inbound and outbound email. The hybrid structure of Progent's Email Guard combines cloud-based filtering with an on-premises gateway device to provide complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. Email Guard's Cloud Protection Layer serves as a preliminary barricade and keeps most threats from reaching your network firewall. This reduces your vulnerability to external attacks and saves network bandwidth and storage. Email Guard's on-premises gateway appliance adds a deeper layer of analysis for incoming email. For outbound email, the on-premises security gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also help Exchange Server to monitor and safeguard internal email that stays within your security perimeter. For more information, visit Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its key servers and apps hosted in a protected Tier III data center on a high-performance virtual machine host configured and maintained by Progent's network support experts. Under the ProSight Virtual Hosting model, the customer retains ownership of the data, the OS platforms, and the applications. Because the environment is virtualized, it can be moved easily to a different hosting environment without requiring a lengthy and difficult configuration procedure. With ProSight Virtual Hosting, your business is not tied a single hosting provider. Find out more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, retrieve and protect information about your IT infrastructure, procedures, business apps, and services. You can quickly find passwords or IP addresses and be alerted automatically about impending expirations of SSLs ,domains or warranties. By cleaning up and organizing your IT infrastructure documentation, you can eliminate as much as half of time spent searching for vital information about your IT network. ProSight IT Asset Management features a centralized repository for holding and sharing all documents related to managing your network infrastructure such as standard operating procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and associating IT information. Whether youíre planning improvements, doing regular maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the information you need when you need it. Find out more about ProSight IT Asset Management service.

Expert Network Security Design
Every business ought to have a carefully thought out security program that includes both proactive processes and response planning. The proactive plan is a set of procedures designed to reduce vulnerabilities. The post-attack plan assists your company's network security engineers to evaluate the impact caused by a security penetration, repair the damage, record the event, and get the IT network operational as soon as possible.

Progent's expert information security engineers are available to assist your business to perform a complete vulnerability evaluation and create a network security plan to implement security policies and mechanisms to minimize ongoing assaults and dangers.

CISM Certified System Security Engineering Services
The CISM committee defines the core competencies and global standards of performance that IT security managers are required to learn. CISM gives executive management the assurance that consultants who have qualified for their CISM credential possess the background and knowledge to provide effective security management and support consulting. Progent offers the support of CISM Premier security professionals to help companies with:

  • IS Security Strategies
  • Vulnerability Analysis
  • Information Security Program Management
  • Network Security Administration
  • Response Management
Learn additional details about Progent's CISM Certified Network Security Consulting Expertise.

CISSP Qualified Security Engineering Services
The CISSP credential denotes mastery of an international standard for network security. The American National Standards Institute has awarded certification accreditation in the field of information protection under ISO/IEC 17024. Progent offers the services of security experts who have qualified for CISSP certification. Progent can provide a CISSP-certified expert to help your business in a broad range of security areas such as:

  • Security Management Procedures
  • Security Architecture and Paradigms
  • Access Control Solutions and Processes
  • Applications Development Security
  • Operations Security
  • Site Security
  • Cryptography Mechanisms
  • Telecom, Network and Internet Security
  • Disaster Recovery Planning
Learn additional information concerning Progent's CISSP Security Consulting Services.

CISSP-ISSAP Accredited Secure Information System Architecture Engineering Assistance
Progent's CISSP-ISSAP Certified information system architecture engineers are experts who have earned ISSAP Certification as a result of rigorous examination and significant experience with network security design. The ISSAP certification indicates demonstrated skill in the more in-depth demands of information system security architecture bounded by the wider field of information system security expertise needed for CISSP certification. Progent's ISSAP-premier security consultants can assist your company with all aspects of secure network architecture such as.

  • Access Control Systems and Techniques
  • Phone System and System Infrastructure Security
  • Encryption/Decryption Options
  • Needs Evaluation and Security Criteria
  • BCP and DRP
  • Site Security
Learn more information concerning Progent's ISSAP Accredited Secure Information System Architecture Consulting Professionals.

CISA Qualified Information System Security Auditing Engineering Expertise
The Certified Information Systems Auditor (CISA) credential is a recognized achievement that represents mastery in information system security auditing. Certified by the American National Standards Institute, the CISA credential requires that candidates pass an extensive examination administered by the ISACA international professional group. Progent's CISA-certified security audit engineers can assist your IT organization in the areas of:

  • IS Audit Process
  • IT Enforcement
  • Systems and Infrastructure Lifecycle Planning
  • Information Technology Service Delivery
  • Safeguarding Information Assets
  • Business Continuity Planning
Get more details about Progent's CISA Qualified IS Security Auditing Engineering Services.

CRISC Consultants
The CRISC certification program was initiated by ISACA to verify a consultant's ability to plan, deploy, and maintain information system control mechanisms to reduce risk. Progent offers the services of a CRISC-certified consultant to assist you to create and execute a business continuity strategy that follows leading practices promoted by CRISC and geared to match your organization's risk appetite, business objectives, and IT budget. Progent's CRISC-qualified network risk management experts can provide a variety of risk evaluation services such as:

  • Gather data and review documentation to evaluate major vulnerabilities
  • Identify statutory, industry, and contractual mandates and organizational standards related to your network to assess their possible influence on your business objectives
  • Identify potential threats for your operational processes to help in analyzing your enterprise risk
  • Create a risk awareness program and provide seminars to ensure your organization appreciate IS risk so they can assist with your risk control program
  • Match key risk scenarios to related operational procedures to help determine risk responsibility
  • Determine risk appetite with your senior leadership and major stakeholders to make sure they are in agreement
Get more information about Progent's CRISC Risk Management Consultants.

GIAC Certified IS Security Engineering Services
Global Information Assurance Certification was founded in 1999 to certify the skill of IT security engineers. GIAC's goal is to assure that an accredited professional has the skills necessary to provide services in critical areas of system, information, and application security. GIAC accreditations are acknowledged by companies and government organizations around the world including and the U.S. NSA. Progent's GIAC network security audit specialists are available to help your company with:

Find out more information concerning Progent's GIAC Information Assurance Services.

Contact a Progent Security Expert
To see how you can contact a Progent security engineer for remote or on-premises support in Arizona, phone 1-800-993-9400 or go to Online Computer Support.