Small business networks in the state of California can depend on prompt and affordable online help from Progent's certified security experts to resolve critical security issues. Rates are competitive, charges are by the minute, sign-up is quick, and support is unbeatable. Progent also provides assistance for long-term projects that demand the expertise of senior security engineers with top security certifications.
If your California office is far from larger metropolitan neighborhoods including Los Angeles, San Jose, San Francisco, or Sacramento, access to local accredited security engineers may be limited when you have a security disaster. This can cause a drop in revenue for your business, angry customers, unproductive workers, and defocused management. By utilizing Progent's online services, you have access to a Certified security engineer who can provide help whenever you require it to keep your computer network on line and restore your data.
Progent can help you in all your initiatives to defend your IT environment with services that ranges from security audits to creating a comprehensive security strategy. Progent offers affordable service to assist businesses of all sizes to set up and manage secure networks powered by Windows and Cisco technology and that can include computers based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus mobile clients with Apple iOS iPhones and iPads or Google Android or Windows Phone handsets.
Progent can also show you how to outsource spam blocking and defense against e-mail-based security threats. Email Guard is Progent's email security solution that uses the technology of top data security vendors to deliver centralized control and comprehensive protection for your inbound and outbound email. The hybrid architecture of Email Guard managed service integrates cloud-based filtering with an on-premises security gateway device to provide complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The cloud filter acts as a preliminary barricade and blocks most unwanted email from making it to your network firewall. This decreases your vulnerability to inbound attacks and conserves system bandwidth and storage space. ProSight Email Guard's on-premises security gateway device provides a deeper layer of analysis for inbound email. For outgoing email, the local gateway offers AV and anti-spam filtering, protection against data leaks, and email encryption. The onsite security gateway can also enable Microsoft Exchange Server to monitor and safeguard internal email that stays within your corporate firewall.
Progent's certified experts are available online or on site to offer a variety of urgent or longer-term network security services such as:
If your company has an immediate need for IT security help, refer to Progent's Emergency Remote Technical Support.
- Perform thorough network security evaluations
- Recuperate promptly after virus and worm attacks
- Configure hardware and software firewalls
- Configure safe methods for offsite and mobile access
- Install effective applications for defense against spam and directory harvest attacks
- Develop a company-wide security plan with proactive network monitoring
- Provide outsourced Help Desk Support
- Help Develop an effective network backup and business continuity plan based on Data Protection Manager (DPM) automated backup technology
Progent's support professionals can deliver advanced support in vital fields of computer security that include security evaluation, firewall and VPN expertise, and high-level security planning.
Progent's certified security engineers can evaluate the vulnerability of your current computer security implementation through exhaustive remote automated testing via advanced software tools and tested techniques. Progent's skill in this service saves you time and money and assures an accurate picture of system vulnerability. The information your business gains can be used as the basis of a network protection strategy that can permit your network to operate safely and react rapidly to future threats.
Automated Network Security Audits
Progent offers consulting in the use of security evaluation software such as Microsoft Baseline Security Analyzer and GFI LANguard Network Security Scanner for economically running a set of automatic system auditing checks to identify potential security problems. Progent has broad knowledge of additional network auditing products such as NMAP Port Scanner, AMAP application mapper, eEye, as well as tools like SolarWinds, Netcat, Hydra, and Nikto. Progent can help you to understand testing reports and respond effectively.
Progent can help you design security into your company processes, configure scanning software, define and implement a secure network environment, and suggest procedures to optimize the safety of your IT system. Progent's security professionals are ready to show you how to configure a firewall, implement secure remote access to email and business applications, and install VPN. Learn additional information about Progent's network security analysis.
Security Inventory Packages for Small Companies
Progent has put together two ultra-affordable security inventory service packages designed to enable small businesses to receive an independent security assessment from a qualified security consultant. With Progent's External Security Inventory Scan, a security expert runs a comprehensive test of your network from beyond your firewalled perimeter to determine possible weaknesses in the security profile you present to the public. With Progent's Internal Security Inventory Scan, a certified security professional executes a network scan from an authorized machine within your company firewall to assess vulnerabilities to internal attacks. Both security inventory services are configured and executed from a secured remote location. The project is managed by an engineer who has earned high-level security accreditations and who generates a report that summarizes and analyzes the data captured by the security scan and suggests cost-effective improvements where called for.
Network Penetration Testing Support Services
Stealth intrusion testing is an important part of any successful network security strategy. Progentís security professionals can perform extensive intrusion checks without the awareness of your company's internal network support staff. Unannounced penetration checking uncovers whether existing security defense systems such as intrusion detection alerts and event history analysis are correctly set up and actively monitored. Learn more about Progent's network penetration analysis consulting.
Progent's expertise in security technology includes in-depth field work with major firewalls and VPN products offered by a variety of companies including Cisco, Microsoft, and CheckPoint. Progent can provide the services of consultants with important networking accreditations including CCIE and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Integration and Troubleshooting
The latest generation of Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer substantially more value than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX firewalls for all new deployments. After Cisco's purchase of Sourcefire, the entire family of ASA 5500-X firewalls can be configured to enable Firepower Services, built on Sourcefire's Snort technology, which is the world's most deployed intrusion protection system. Firepower services provide enhanced capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-premier CCIE network consultants can assist your company to manage your legacy PIX or Cisco ASA 5500 security appliances and upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your company to design, configure, tune, administer and troubleshoot firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. See additional details about ASA 5500-X Firewalls with Firepower Services configuration and troubleshooting support.
Cisco Security and VPN Support Expertise
Cisco's security and offsite connection technology offer a comprehensive line of manageable security solutions to help safeguard your local and remote information system. Cisco's Virtual Private Network line includes switches, firewalls, intrusion detection devices and VPN concentrators. Progent's expert staff of consultants includes experienced specialists with Cisco's CCIE and CCNP certifications who are able to help your business to select Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that fit most closely with your company objectives. Read additional information about Progent's Consulting Expertise for Cisco Security Solutions and VPN Appliances.
Engineering Expertise for Additional Firewall and VPN Solutions
Progent provides small and medium size organizations professional consulting for Intrusion Protection products and IPsec VPN technology from leading firewall and VPN security vendors such as Check Point Software, Juniper, and Symantec. Progent can show you how to create a detailed security plan and choose the right products from multiple suppliers to support your security objectives while sticking within your spending restraints.
Progent's Low-Cost Managed Services for Information Assurance
Progent's low-cost ProSight line of network monitoring and management services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection solution that utilizes cutting edge behavior analysis technology to defend endpoints as well as physical and virtual servers against new malware attacks like ransomware and email phishing, which routinely evade traditional signature-based anti-virus tools. ProSight Active Security Monitoring protects local and cloud-based resources and offers a unified platform to automate the complete threat progression including protection, detection, mitigation, remediation, and forensics. Top features include one-click rollback using Windows Volume Shadow Copy Service and automatic network-wide immunization against new threats. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection (ESP) services deliver ultra-affordable in-depth security for physical and virtual servers, workstations, mobile devices, and Exchange email. ProSight ESP utilizes adaptive security and modern behavior analysis for continuously monitoring and responding to security assaults from all vectors. ProSight ESP provides two-way firewall protection, intrusion alarms, device management, and web filtering through cutting-edge tools packaged within one agent accessible from a single console. Progent's data protection and virtualization experts can assist you to plan and configure a ProSight ESP environment that addresses your company's specific requirements and that helps you achieve and demonstrate compliance with government and industry data security standards. Progent will assist you specify and configure security policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alarms that call for urgent action. Progent's consultants can also assist you to install and test a backup and disaster recovery solution such as ProSight Data Protection Services so you can get back in business quickly from a potentially disastrous security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Microsoft Exchange filtering.
ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services from Progent offer small and medium-sized organizations an affordable end-to-end service for reliable backup/disaster recovery (BDR). Available at a fixed monthly cost, ProSight Data Protection Services automates and monitors your backup activities and allows fast restoration of vital data, applications and VMs that have become lost or corrupted as a result of hardware failures, software bugs, disasters, human mistakes, or malicious attacks such as ransomware. ProSight DPS can help you back up, recover and restore files, folders, applications, system images, plus Hyper-V and VMware images/. Important data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's cloud backup consultants can deliver world-class expertise to set up ProSight Data Protection Services to to comply with regulatory standards such as HIPPA, FIRPA, PCI and Safe Harbor and, when necessary, can help you to restore your business-critical data. Find out more about ProSight Data Protection Services Managed Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the technology of top data security vendors to provide centralized control and world-class protection for all your inbound and outbound email. The hybrid architecture of Email Guard integrates a Cloud Protection Layer with an on-premises security gateway device to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The Cloud Protection Layer acts as a first line of defense and keeps the vast majority of threats from reaching your network firewall. This reduces your exposure to inbound attacks and saves network bandwidth and storage. Email Guard's on-premises gateway appliance provides a further layer of inspection for incoming email. For outgoing email, the onsite gateway provides AV and anti-spam filtering, DLP, and email encryption. The on-premises security gateway can also help Exchange Server to monitor and safeguard internal email that stays inside your corporate firewall. For more details, visit ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and applications hosted in a protected fault tolerant data center on a fast virtual host set up and managed by Progent's network support experts. Under Progent's ProSight Virtual Hosting service model, the customer retains ownership of the data, the OS platforms, and the apps. Since the system is virtualized, it can be moved easily to an alternate hardware solution without a lengthy and technically risky reinstallation procedure. With ProSight Virtual Hosting, you are not tied a single hosting service. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, update, find and protect data related to your network infrastructure, procedures, business apps, and services. You can quickly locate passwords or IP addresses and be warned about upcoming expirations of SSLs ,domains or warranties. By updating and managing your IT infrastructure documentation, you can save as much as half of time spent searching for critical information about your IT network. ProSight IT Asset Management includes a centralized repository for holding and sharing all documents required for managing your network infrastructure like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and associating IT information. Whether youíre planning enhancements, doing maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the information you need the instant you need it. Find out more about ProSight IT Asset Management service.
Certified Security Planning
Every company ought to develop a carefully considered security program that includes both pre-attack processes and reaction plans. The proactive plan is a collection of procedures designed to reduce vulnerabilities. The post-attack plan helps your IT security personnel to evaluate the impact resulting from a security penetration, fix the network, record the event, and get business functions running as soon as feasible.
Progent's expert IT security engineers are available to assist your business to run a complete risk assessment and define a network security plan to implement security processes and mechanisms to minimize ongoing attacks and dangers.
CISM Accredited Information Security Consulting Assistance
The CISM committee describes the basic capabilities and international standards of performance that IT security professionals are expected to learn. It gives business management the assurance that consultants who have qualified for their CISM certification have the background and capability to provide effective security administration and consulting consulting. Progent can provide the support of CISM Premier security professionals to assist businesses with:
Find out additional details about Progent's CISM Accredited Security Engineering Professionals.
- IS Security Processes
- Vulnerability Analysis
- Network Security Program Management
- Network Security Administration
- Recovery Planning
CISSP Accredited Security Engineering Expertise
The CISSP credential denotes expertise with a global standard for data security. The American National Standards Institute has awarded the CISSP credential recognition in the area of information security stipulated by ISO 17024. Progent can provide access to of security professionals who have earned CISSP accreditation. Progent can give you access to a CISSP-certified professional to help your organization in a variety security fields including:
Learn additional details concerning Progent's CISSP Qualified Network Security Support Professionals.
- Security Management Practices
- Security Infrastructure and Models
- Access Control Solutions and Methodology
- Applications Development Security
- Secure Operations
- Site Security
- Data Encryption Technology
- Telecommunications, LAN and Internet Security
- Disaster Recovery Preparedness
CISSP-ISSAP Qualified Secure IT Architecture Engineering Expertise
Progent's CISSP-ISSAP Certified IT architecture professionals are consultants who have earned ISSAP Certification as a result of thorough testing and significant experience with information security architecture. The Information System Security Architecture Professional (ISSAP) credential represents demonstrated skill in the most in-depth demands of IS security architecture bounded by the wider field of information security knowledge needed for CISSP accreditation. Progent's ISSAP-certified security consultants can assist your business with all aspects of architecture security including.
Learn more information about Progent's ISSAP Certified Secure System Architecture Engineering Professionals.
- Access Control Mechanisms and Techniques
- Telecommunications and Network Infrastructure Protection
- Encryption/Decryption Options
- Requirements Analysis and Security Criteria
- Business Continuity Planning and Disaster Recovery Planning
- Site Security
CISA Certified IS Security Auditing Engineering Services
The Certified Information Systems Auditor accreditation is a recognized qualification that indicates expertise in IS security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA accreditation has candidates undergo a comprehensive examination administered by the ISACA international professional group. Progent's CISA-certified IS security audit experts can assist your business in the areas of:
Learn additional information about Progent's CISA Certified IS Security Auditing Consulting Expertise.
- IS Audit Process
- Information Technology Administration
- Systems and Infrastructure Lifecycle Planning
- IT Support
- Safeguarding Information Assets
- Disaster Recovery Planning
The CRISC certification program was established by ISACA in 2010 to validate an IT professional's ability to design, implement, and support information system control mechanisms to mitigate network risk. Progent offers the services of a CRISC-certified consultant to assist your company to create and execute a workplace continuity plan based on industry best practices promoted by CRISC and crafted to align with your company's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC network risk management experts can provide a variety of risk assessment services such as:
Learn more information about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Collect information and study documentation to evaluate significant risk scenarios
- Inventory legal, industry, and contractual requirements and company policies associated with your information system to assess their potential influence on your business objectives
- Identify possible vulnerabilities for your business processes to help in evaluating your enterprise risk
- Develop a risk awareness program and conduct seminars to ensure your stakeholders understand IT risk so they can contribute to your risk management program
- Match key risk scenarios to your associated operational processes to help determine risk ownership
- Determine risk tolerance with your senior management and major stakeholders to make sure they are in agreement
GIAC Certified Security Consulting Services
Learn additional details about Progent's GIAC Information Assurance Expertise.
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the skill of information technology security professionals. GIAC's goal is to ensure that an accredited professional possesses the knowledge needed to provide support in critical categories of system, information, and application program security. GIAC certifications are acknowledged by companies and government organizations around the world including and the U.S. NSA. Progent's GIAC security audit experts are available to help your IT organization in the areas of:
Get in Touch with a Certified Security Specialist
To see how to get in touch with a certified Progent security engineer for remote or onsite help in California, phone 1-800-993-9400 or visit Online Computer Help.