Company networks inCalifornianow have fast and affordable remote help from Progent's qualified security professionals to assist with urgent security problems. The cost is affordable, billing is by the minute, engagement is quick, and support is unbeatable. Progent also offers help for complex engagements that demand the services of seasoned security engineers with high-level security certifications.
If yourCaliforniacompany is based far from major urban areas such asLos Angeles, San Jose, San Francisco, or Sacramento, access to local accredited network security engineers may be problematic during a security disaster. This can result in lost revenue for your company, upset clients, idle workers, and defocused management. By utilizing Progent's remote support, you have access to a Certified security consultant who can provide expertise whenever you need it to get your network running and restore your information.
Progent can assist you in a variety of ways in your efforts to defend your network with support ranging from security checks to creating a comprehensive security strategy. Progent provides affordable support to help companies of any size to configure and manage safe networks based on Microsoft Windows and Cisco technology and that may include computers running UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus BYOD clients with Apple iOS iPhones and iPads or Android or Windows Phone handsets.
Progent can also assist you to outsource spam filtering and protection from email-borne attacks. Email Guard is Progent's email filtering and encryption platform that incorporates the services and infrastructure of leading information security vendors to provide web-based control and world-class security for your inbound and outbound email. The powerful architecture of Email Guard managed service combines a Cloud Protection Layer with an on-premises security gateway device to offer advanced defense against spam, viruses, Dos Attacks, DHAs, and other email-based threats. ProSight Email Guard's cloud filter serves as a first line of defense and keeps most unwanted email from making it to your security perimeter. This decreases your vulnerability to inbound threats and conserves network bandwidth and storage space. ProSight Email Guard's on-premises gateway device provides a further layer of analysis for incoming email. For outbound email, the on-premises security gateway offers anti-virus and anti-spam protection, protection against data leaks, and email encryption. The local security gateway can also enable Microsoft Exchange Server to monitor and safeguard internal email traffic that stays inside your corporate firewall.
Progent's certified experts are available online or on premises to provide a range of emergency or longer-term IT security services including:
If your business has an urgent requirement for IT security support, go to Progent's Urgent Online Network Help.
- Run automated security evaluations
- Recover rapidly after virus and worm attacks
- Set up hardware and software firewalls
- Implement safe solutions for remote and mobile access
- Install advanced applications for automatic protection against viruses, spam and DHAs
- Help create a company-wide security strategy with proactive monitoring
- Provide comprehensive Call Center Services
- Develop a practical data backup and recovery solution centered on Microsoft DPM automated backup capability
Progent's security experts can deliver world-class support in vital facets of network security including security assessment, firewall and VPN solutions, and advanced security consulting.
Progent's expert security consultants can assess the strength of your current network security environment through exhaustive remote automated analysis via sophisticated software tools and tested techniques. Progent's experience in this testing saves your company consulting fees and offers an accurate portrayal of gaps. The knowledge your IT organization is provided can be used as the foundation of a security plan that will allow your network to run dependably and adapt quickly to new threats.
Automated Security Analysis
Progent offers consulting in the use of security auditing products including Microsoft Baseline Security Analyzer and GFI LANguard NSS for affordably running a set of programmed system auditing scans to identify possible security gaps. Progent has broad experience with additional security auditing utilities including NMAP, AMAP, eEye, as well as tools such as SolarWinds, Netcat, Socat, and Nikto. Progent can show you how to understand testing reports and respond effectively.
Progent can help you build security into your company operations, configure auditing applications, plan and deploy a secure network architecture, and suggest procedures to optimize the security of your IT system. Progent's security consultants are able to show you how to set up a firewall, implement safe remote access to email and data, and integrate virtual private network. Find out more about Progent's network security audits.
Security Inventory Packages for Small Businesses
Progent has put together two ultra-affordable security inventory scanning bundles intended to allow small businesses to receive an impartial security assessment from a qualified security specialist. With Progent's External Network Security Inventory Checkup, a security expert administers a comprehensive test of your network from outside your firewalled perimeter to determine possible risks in the security profile you present to the outside world. With Progent's Internal Network Security Inventory Checkup, a certified security professional runs a network scan from a secure machine within your company firewall to assess your exposure to internal assaults. The two security inventory packages are configured and run from a secured remote site. The project is directed by an engineer who has earned high-level security accreditations and who produces a report that summarizes and interprets the information captured by the security scan and suggests cost-effective remediation where called for.
Network Penetration Analysis Support Services
Stealth penetration testing is a key part of any successful IT system security plan. Progentís security experts can run extensive intrusion tests without the awareness of your company's internal network support resources. Unannounced penetration testing uncovers whether current security defense tools such as intrusion incident warnings and event log analysis are properly configured and actively monitored. Learn additional information about Progent's stealth security penetration testing consulting.
Firewall And Virtual Private Network (VPN) Solutions
Progent's background in security solutions encompasses extensive field work with leading firewalls and Virtual Private Network technology offered by a variety of companies such as Cisco, Microsoft, and Symantec. Progent can provide the services of engineers who have earned important industry accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Configuration and Debugging
The new ASA 5500-X Series of firewalls with Firepower Services offer significantly more value than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new installations. After Cisco's purchase of Sourcefire, the whole family of ASA 5500-X firewalls can be provisioned to enable Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular network intrusion protection system. Firepower services bring enhanced capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-premier CCIE network consultants can assist your company to manage your existing PIX or ASA 5500 security appliances or upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your organization to plan, integrate, optimize, administer and debug firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Read more information about ASA 5500-X Firewalls with Firepower Services integration and troubleshooting services.
Cisco Network Security and Virtual Private Network Support Expertise
Cisco's security and offsite connection technology offer a full line of easy-to-administer security solutions to help protect your local and remote network infrastructure. Cisco's Virtual Private Network line features switches, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's expert staff of consultants includes field-proven specialists with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional qualifications who can assist your organization to select Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that align best with your business goals. Learn more information concerning Progent's Consulting Expertise for Cisco Security Technology and VPN Products.
Support Services for Additional Firewall and VPN Products
Progent provides small and mid-size businesses professional consulting for Intrusion Protection products and IPsec VPN products from major firewall and VPN security companies such as Check Point Software, Juniper, and Symantec. Progent can help you design a detailed security strategy and choose the right technologies from a variety of suppliers to achieve your security goals while sticking within your spending limits.
Progent's Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight family of outsourced network management services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes cutting edge behavior analysis technology to guard endpoints as well as servers and VMs against new malware assaults such as ransomware and email phishing, which routinely evade legacy signature-based anti-virus tools. ProSight ASM protects on-premises and cloud resources and offers a single platform to automate the entire malware attack lifecycle including filtering, infiltration detection, containment, cleanup, and post-attack forensics. Top capabilities include single-click rollback using Windows Volume Shadow Copy Service and automatic network-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection managed services deliver economical in-depth protection for physical servers and VMs, workstations, smartphones, and Exchange email. ProSight ESP utilizes adaptive security and modern behavior analysis for round-the-clock monitoring and reacting to cyber threats from all attack vectors. ProSight ESP provides two-way firewall protection, penetration alarms, device management, and web filtering through cutting-edge technologies packaged within a single agent managed from a single control. Progent's data protection and virtualization consultants can assist you to plan and configure a ProSight ESP deployment that meets your organization's specific requirements and that helps you prove compliance with legal and industry data security regulations. Progent will help you specify and implement policies that ProSight ESP will manage, and Progent will monitor your network and react to alerts that require immediate attention. Progent's consultants can also help your company to install and verify a backup and disaster recovery system like ProSight Data Protection Services (DPS) so you can recover rapidly from a potentially disastrous security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Exchange filtering.
ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services offer small and mid-sized businesses a low cost end-to-end service for secure backup/disaster recovery. Available at a fixed monthly cost, ProSight Data Protection Services automates and monitors your backup processes and allows fast recovery of vital files, applications and virtual machines that have become unavailable or corrupted due to hardware failures, software bugs, disasters, human mistakes, or malicious attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, applications, system images, as well as Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to an on-promises device, or mirrored to both. Progent's cloud backup specialists can deliver world-class expertise to configure ProSight DPS to be compliant with regulatory standards like HIPPA, FIRPA, PCI and Safe Harbor and, whenever needed, can assist you to recover your business-critical data. Find out more about ProSight Data Protection Services Managed Cloud Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that incorporates the technology of top data security companies to deliver centralized control and world-class protection for all your email traffic. The hybrid structure of Email Guard managed service integrates a Cloud Protection Layer with an on-premises security gateway appliance to provide advanced protection against spam, viruses, Dos Attacks, DHAs, and other email-based malware. The cloud filter serves as a preliminary barricade and blocks most unwanted email from making it to your network firewall. This reduces your vulnerability to external attacks and conserves system bandwidth and storage. Email Guard's on-premises gateway appliance provides a deeper layer of analysis for incoming email. For outgoing email, the on-premises security gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The local gateway can also assist Microsoft Exchange Server to monitor and protect internal email traffic that originates and ends within your corporate firewall. For more details, see Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its key servers and applications hosted in a secure fault tolerant data center on a fast virtual host configured and maintained by Progent's network support professionals. Under the ProSight Virtual Hosting service model, the client retains ownership of the data, the OS software, and the apps. Since the environment is virtualized, it can be moved easily to a different hosting environment without a time-consuming and difficult configuration process. With ProSight Virtual Hosting, your business is not tied a single hosting service. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, update, find and safeguard data about your network infrastructure, processes, applications, and services. You can instantly find passwords or IP addresses and be warned automatically about upcoming expirations of SSLs or warranties. By cleaning up and organizing your IT documentation, you can save as much as 50% of time spent looking for vital information about your IT network. ProSight IT Asset Management includes a centralized repository for holding and collaborating on all documents related to managing your network infrastructure like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports a high level of automation for collecting and relating IT information. Whether youíre planning improvements, doing maintenance, or responding to a crisis, ProSight IT Asset Management gets you the data you need as soon as you need it. Find out more about Progent's ProSight IT Asset Management service.
Certified Network Security Planning
Every company should develop a carefully considered security strategy that incorporates both proactive processes and reaction plans. The pre-attack strategy is a collection of mechanisms intended to reduce security weaknesses. The post-attack strategy assists your network security engineers to assess the damage caused by a security penetration, repair the network, document the event, and get the IT network restored as soon as possible.
Progent's certified IS security engineers can to help you to perform a comprehensive risk evaluation and create a computer security strategy to establish security policies and controls to reduce ongoing attacks and threats.
CISM Certified System Security Support Expertise
The Certified Information Security Manager (CISM) organization defines the basic competencies and international standards of performance that information security professionals are expected to learn. CISM provides executive management the confidence that consultants who have earned their CISM credential possess the experience and knowledge to deliver efficient security administration and consulting consulting. Progent offers the services of CISM Premier security professionals to help companies with:
Read additional information about Progent's CISM Qualified Information Security Support Professionals.
- IS Security Processes
- Vulnerability Management
- Information Security Implementation Management
- Network Security Management
- Response Planning
CISSP Qualified Security Engineering Services
CISSP certification denotes mastery of a global standard for data security. The American National Standards Institute has granted the CISSP credential accreditation in the area of information protection stipulated by ISO 17024. Progent offers the services of security professionals who have earned CISSP certification. Progent can provide a CISSP-certified professional to help your enterprise in a broad range of security areas including:
Learn more details concerning Progent's CISSP Accredited Security Consulting Services.
- Security Management Procedures
- Security Architecture and Models
- Access Management Systems and Methodology
- Software Development Security
- Operations Security
- Physical Security
- Encryption/Decryption Mechanisms
- Telecommunications, Network and Internet Security
- Disaster Recovery Preparedness
CISSP-ISSAP Certified Secure IT Architecture Engineering Services
Progent's CISSP-ISSAP Premier information system architecture professionals are consultants who have earned ISSAP status through thorough examination and extensive experience with information security design. The Information System Security Architecture Professional (ISSAP) credential indicates proven competence in the most complex demands of IS security architecture bounded by the wider scope of information security knowledge required for CISSP accreditation. Progent's ISSAP-certified security consultants can help your business with all phases of secure network architecture including.
Learn more information about Progent's ISSAP Certified Secure IT Architecture Consulting Services.
- Access Management Systems and Methodologies
- Phone System and System Infrastructure Security
- Cryptography Solutions
- Requirements Analysis and Security Criteria
- Business Continuity Planning and DRP
- Site Security
CISA Certified Information System Security Auditing Consulting Services
The Certified Information Systems Auditor (CISA) credential is a prestigious qualification that indicates mastery in information system security audit and control. Certified by the American National Standards Institute (ANSI), the CISA credential has candidates pass an extensive examination administered by the ISACA professional group. Progent's CISA information security audit engineers are available to assist your business with:
Get more details concerning Progent's CISA Certified IS Security Auditing Engineering Expertise.
- IS Audit Process
- IT Administration
- Systems and Architecture Lifecycle Planning
- Information Technology Service Delivery
- Protecting Information Resources
- Disaster Recovery Preparedness
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA in 2010 to verify a consultant's skills to plan, implement, and support information system controls to mitigate risk. Progent can provide the services of a CRISC-certified engineer to assist your company to develop and carry out a workplace continuity plan based on industry best practices identified by CRISC and crafted to match your organization's risk tolerance, business objectives, and IT budget. Progent's CRISC-qualified network risk management consultants offer a range of risk evaluation services including:
Read the details about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Gather information and study documentation to help identify significant risk scenarios
- Inventory statutory, industry, and business mandates and organizational policies associated with your information system to determine their possible impact on your business objectives
- Point out possible threats for your business processes to help in analyzing your enterprise risk
- Develop a risk awareness initiative and provide training to make sure your stakeholders appreciate IT risk so they can assist with your risk management process
- Match key risk vectors to your associated business processes to help assign risk ownership
- Determine risk appetite with your senior leadership and major stakeholders to make sure they align
GIAC Certified Network Security Engineering Support
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the knowledge of computer security engineers. GIAC's mission is to assure that a certified professional has the knowledge needed to provide services in vital categories of system, data, and application program security. GIAC certifications are recognized by businesses and government organizations around the world including and the U.S. National Security Agency. Progent's GIAC network security audit engineers can help your business with:
Find out more information about Progent's GIAC Information Assurance Services.
- Auditing Networks
- Security Incident Handling
- Traffic Analysis
- Web-based Services Security
- SIEM solutions
Talk to a Progent Security Expert
To learn how you can contact a certified security engineer for remote or on-premises assistance in California, call 1-800-993-9400 or go to Remote Network Support.