Company IT networks in California now have quick and economical remote access to Progent's qualified network security consultants to help with the toughest security problems. Rates are competitive, billing is by the minute, engagement is fast, and service is unbeatable. Progent also provides assistance for complex engagements that requires the knowledge of seasoned security consultants with high-level industry certifications.
In case your California company is away from larger metropolitan areas like Los Angeles, San Jose, San Francisco, or Sacramento, contact with local accredited network security consultants is often limited during an emergency. This could mean a drop in revenue for your business, upset clients, unproductive workers, and distracted executives. By contacting Progent's remote support, you can get in touch with a Certified security professional ready to offer help when you have to have it to keep your network on line and restore your data.
Progent can assist you in your efforts to guard your IT environment with support that ranges from security assessments to developing a company-wide security plan. Progent offers affordable support to help companies of any size to configure and manage protected networks based on Microsoft Windows and Cisco technology and that can include computers based on UNIX, Linux, Solaris, or Apple Mac OS X operating systems as well as BYOD users with Apple handhelds or Google Android or Windows Phone devices.
Progent can also assist you to outsource spam blocking and protection from email-borne security threats. Email Guard is Progent's email filtering and encryption solution that incorporates the technology of leading information security vendors to provide centralized management and comprehensive security for all your email traffic. The hybrid structure of Progent's Email Guard integrates cloud-based filtering with a local gateway device to offer complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. ProSight Email Guard's Cloud Protection Layer serves as a preliminary barricade and blocks most threats from making it to your security perimeter. This decreases your vulnerability to inbound attacks and conserves network bandwidth and storage space. ProSight Email Guard's onsite security gateway appliance adds a further level of inspection for incoming email. For outgoing email, the onsite gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The onsite security gateway can also help Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends within your security perimeter.
Progent's security consultants are accessible remotely or in person to offer a variety of emergency or longer-term computer security services such as:
If your business has an urgent requirement for computer security help, refer to Progent's Urgent Remote Network Support.
- Run extensive network security audits
- Clean up promptly after virus and worm attacks
- Set up and troubleshoot firewalls
- Implement safe solutions for remote and mobile connectivity
- Deploy effective applications for automatic defense against viruses, spam and directory harvest attacks
- Help create a company-wide security strategy with 24x7 network monitoring
- Offer outsourced Help Desk Services
- Develop a practical network backup and disaster recovery plan based on Data Protection Manager (DPM) automated backup capability
Progent's consultants offer world-class services in key fields of network security that include security assessment, firewall/VPN support, and advanced security planning.
Progent's expert security engineers can assess the strength of your existing network protection implementation by performing comprehensive remote automated testing via sophisticated software tools and proven techniques. Progent's skill in this testing saves your company time and money and assures an objective picture of security holes. The knowledge your IT organization gains can be used as the foundation of a network protection strategy that will permit your network to run safely and react rapidly to new risks.
Automated Vulnerability Assessment
Progent provides expertise in the application of security testing software such as MBSA and GFI LANguard NSS for affordably running a variety of automatic system testing checks to uncover potential security weaknesses. Progent has extensive knowledge of other network auditing utilities such as NMAP, AMAP Application Scanner, eEye, plus tools such as Metasploit, Netcat, Hydra, and Nikto. Progent can help you to make sense of testing reports and respond effectively.
Progent can show you how to build protection into your business operations, install auditing software, plan and implement a secure network architecture, and recommend procedures to optimize the security of your IT system. Progent's security engineers are available to show you how to configure a firewall, implement safe remote connectivity to email and business applications, and install VPN. Find out more concerning Progent's network security analysis.
Security Inventory Service Bundles for Small Companies
Progent offers two low-cost security inventory scanning packages intended to enable small companies to receive an objective network security assessment from a qualified security engineer. With Progent's External Security Inventory Checkup, an engineer runs a comprehensive examination of your IT infrastructure from beyond your firewall to determine possible weaknesses in the security profile you expose to the public. With Progent's Internal Security Inventory Checkup, a security expert executes a system scan from an authorized machine inside your firewall to assess vulnerabilities to internal attacks. The two security inventory packages are configured and run from a secured remote location. The project is managed by a consultant who has earned high-level security credentials and who produces a document that summarizes and interprets the data captured by the security scan and suggests cost-effective remediation if appropriate.
Network Security Penetration Analysis Support Services
Stealth intrusion checking is an important part of any comprehensive network security plan. Progentís security professionals can run extensive intrusion checks without the knowledge of your organization's in-house IT staff. Unannounced penetration testing shows whether current security defense tools such as intrusion incident warnings and event log analysis are properly set up and consistently checked. Find out additional information on Progent's stealth security penetration testing support services.
Firewall and Virtual Private Network Solutions
Progent's expertise in network security technology encompasses in-depth field work with major firewalls and VPN products from a variety of companies including Cisco, Microsoft, and Symantec. Progent offers the services of engineers with key industry accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Integration and Troubleshooting
The new Cisco ASA 5500-X Series of firewalls with Firepower Services provide substantially more value than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 security appliances for new deployments. Following Cisco's purchase of Sourcefire, the whole family of Cisco ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system. Firepower services provide enhanced capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-premier CCIE network experts can assist you to maintain your current PIX or Cisco ASA 5500 firewalls and upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your organization to design, integrate, tune, manage and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Read additional details about Cisco ASA 5500-X Firewalls with Firepower Services integration and debugging support.
Cisco Network Security and Virtual Private Network Support Services
Cisco's security and remote connection products represent a full range of manageable security solutions to help safeguard your local and remote information system. Cisco's Virtual Private Network product family includes switches, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's expert staff of consultants includes experienced specialists with Cisco CCIE and CCNP qualifications who are able to help your company to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that align best with your business objectives. Read more information about Progent's Support Services for Cisco Security Technology and Virtual Private Network Appliances.
Engineering Services for Other Firewall and Virtual Private Network Products
Progent offers small and medium size businesses professional support for Intrusion Protection Systems and IPsec VPN technology from leading firewall and Virtual Private Network security companies including Check Point Software, Juniper, and Symantec. Progent can show you how to create a comprehensive security plan and select the right technologies from a variety of suppliers to achieve your security goals while sticking within your spending restraints.
Progent's Fixed-price Managed Services for Information Security
Progent's low-cost ProSight series of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection solution that incorporates next generation behavior analysis tools to guard endpoint devices and physical and virtual servers against new malware assaults like ransomware and email phishing, which easily evade traditional signature-matching anti-virus products. ProSight ASM safeguards local and cloud-based resources and provides a single platform to automate the complete malware attack lifecycle including blocking, detection, mitigation, cleanup, and post-attack forensics. Key features include one-click rollback with Windows VSS and automatic system-wide immunization against newly discovered attacks. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) managed services offer ultra-affordable in-depth protection for physical and virtual servers, desktops, mobile devices, and Exchange Server. ProSight ESP uses adaptive security and modern behavior analysis for continuously monitoring and responding to security threats from all attack vectors. ProSight ESP offers firewall protection, intrusion alarms, device control, and web filtering through cutting-edge tools incorporated within a single agent managed from a unified console. Progent's security and virtualization consultants can help your business to plan and configure a ProSight ESP environment that meets your organization's unique needs and that allows you achieve and demonstrate compliance with government and industry information protection standards. Progent will assist you specify and implement policies that ProSight ESP will manage, and Progent will monitor your network and react to alarms that require immediate action. Progent's consultants can also help you to set up and verify a backup and disaster recovery solution like ProSight Data Protection Services (DPS) so you can recover rapidly from a potentially disastrous cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Microsoft Exchange filtering.
ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services provide small and mid-sized organizations a low cost and fully managed service for secure backup/disaster recovery. For a low monthly rate, ProSight DPS automates and monitors your backup activities and allows rapid recovery of vital files, applications and virtual machines that have become unavailable or damaged due to component failures, software bugs, disasters, human error, or malware attacks like ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, applications, system images, plus Hyper-V and VMware images/. Critical data can be backed up on the cloud, to an on-promises storage device, or mirrored to both. Progent's cloud backup consultants can deliver advanced support to set up ProSight Data Protection Services to be compliant with government and industry regulatory requirements such as HIPPA, FIRPA, and PCI and, when needed, can help you to recover your business-critical information. Find out more about ProSight DPS Managed Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that uses the infrastructure of top data security companies to provide web-based control and world-class security for all your inbound and outbound email. The powerful architecture of Progent's Email Guard integrates cloud-based filtering with an on-premises security gateway appliance to provide advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The cloud filter acts as a preliminary barricade and blocks the vast majority of threats from reaching your network firewall. This reduces your exposure to external attacks and saves system bandwidth and storage space. Email Guard's on-premises security gateway appliance adds a deeper layer of inspection for inbound email. For outgoing email, the local security gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also assist Exchange Server to track and protect internal email traffic that originates and ends inside your security perimeter. For more details, visit Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and apps hosted in a secure fault tolerant data center on a high-performance virtual host set up and managed by Progent's IT support professionals. With Progent's ProSight Virtual Hosting model, the client retains ownership of the data, the operating system software, and the apps. Because the environment is virtualized, it can be moved easily to an alternate hosting solution without a time-consuming and difficult reinstallation process. With ProSight Virtual Hosting, your business is not tied a single hosting provider. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, maintain, find and safeguard information related to your network infrastructure, processes, business apps, and services. You can instantly locate passwords or IP addresses and be alerted automatically about upcoming expirations of SSL certificates ,domains or warranties. By updating and managing your IT documentation, you can save up to 50% of time spent trying to find vital information about your IT network. ProSight IT Asset Management features a centralized repository for storing and collaborating on all documents required for managing your network infrastructure like standard operating procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT data. Whether youíre planning enhancements, doing regular maintenance, or responding to an emergency, ProSight IT Asset Management gets you the knowledge you require as soon as you need it. Find out more about Progent's ProSight IT Asset Management service.
Certified Network Security Design
Any business ought to have a carefully thought out security strategy that includes both preventive procedures and response planning. The proactive strategy is a set of mechanisms intended to reduce vulnerabilities. The reactive plan helps your company's IT security engineers to assess the damage caused by an attack, repair the damage, document the experience, and get business functions restored as rapidly as feasible.
Progent's expert information security consultants can to help you to perform a complete vulnerability assessment and define a company-wide security plan to establish security policies and mechanisms to reduce ongoing assaults and threats.
CISM Accredited System Security Support Services
The Certified Information Security Manager (CISM) committee defines the core capabilities and international standards of skill that IT security managers are expected to learn. It provides executive management the assurance that those who have qualified for their CISM certification possess the background and capability to deliver effective security management and consulting services. Progent offers the expertise of CISM Premier security professionals to help companies with:
Read additional information concerning Progent's CISM Certified Network Security Support Services.
- Network Security Strategies
- Risk Analysis
- Network Security Program Management
- Information Security Management
- Response Management
CISSP Accredited Security Consulting Services
The CISSP credential denotes expertise with a global standard for network security. ANSI (American National Standards Institute) has awarded the CISSP credential accreditation in the field of information security under ISO 17024. Progent can provide the services of security professionals who have earned CISSP accreditation. Progent can give you access to a CISSP-certified consultant to help your business in a variety security areas including:
Find out additional information concerning Progent's CISSP Accredited Information Security Support Services.
- Security Administration Procedures
- Security Architecture and Models
- Access Management Solutions and Methodology
- Software Development Security
- Secure Operations
- Site Security
- Data Encryption Technology
- Telecommunications, LAN and WAN Security
- Business Continuity Preparedness
CISSP-ISSAP Qualified Secure Information System Architecture Consulting Expertise
Progent's CISSP-ISSAP Certified network architecture professionals are consultants who have earned ISSAP status through rigorous examination and extensive experience with information security design. The ISSAP certification indicates demonstrated skill in the most complex requirements of IS security architecture bounded by the wider scope of information security expertise required for CISSP certification. Progent's ISSAP-certified security specialists can help your company with all phases of architecture security including.
Learn additional information about Progent's ISSAP Accredited Secure IT Architecture Engineering Professionals.
- Access Control Systems and Methodologies
- Telecom and Network Protection
- Cryptography Options
- Requirements Analysis and Security Criteria
- Business Continuity Planning and Disaster Recovery Planning (DRP)
- Site Security
CISA Accredited IS Security Auditing Consulting Assistance
The CISA credential is an important qualification that indicates mastery in network security auditing. Accredited by the American National Standards Institute, the CISA accreditation requires that consultants undergo a comprehensive examination administered by the ISACA international professional association. Progent's CISA-qualified information security audit specialists are available to assist your company with:
Get additional information about Progent's CISA Qualified IS Security Auditing Engineering Expertise.
- Information Systems Audit Process
- Information Technology Enforcement
- Network Assets and Infrastructure Planned Useful Life
- Information Technology Support
- Safeguarding Information Resources
- Business Continuity Preparedness
Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC program was established by ISACA to verify an IT professional's skills to plan, implement, and support IS controls to mitigate risk. Progent can provide the expertise of a CRISC-certified consultant to assist you to develop and execute a workplace continuity or disaster recovery plan that follows leading practices identified by CRISC and crafted to match your organization's risk appetite, business objectives, and IT budget. Progent's CRISC-certified IT risk mitigation consultants can provide a variety of risk identification services such as:
Find out more information concerning Progent's CRISC Risk Management Consultants.
- Gather data and study documentation to evaluate major vulnerabilities
- Identify legal, regulatory, and contractual requirements and organizational standards related to your information system to determine their possible impact on your business goals
- Point out possible vulnerabilities for your operational workflows to assist in evaluating your corporate risk
- Develop a risk awareness program and conduct training to make sure your organization understand information system risk so they can contribute to your risk control program
- Match identified risk scenarios to your associated operational processes to help determine risk responsibility
- Determine risk appetite with your senior leadership and key stakeholders to make sure they align
GIAC Accredited Network Security Consulting Assistance
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the knowledge of network security experts. GIAC's mission is to ensure that an accredited security consultant has the skills appropriate to deliver services in important areas of network, data, and program security. GIAC certifications are recognized by companies and institutions around the world including and the U.S. National Security Agency. Progent's GIAC-qualified security audit specialists are available to help your IT organization with:
Find out more details concerning Progent's GIAC Information Assurance Services.
- Auditing Security Systems
- Security Incident Handling
- Traffic Analysis
- Web Application Security
- SIEM solutions
Get in Touch with a Certified Progent Security Expert
To learn how to access a certified Progent security engineer for remote or on-premises expertise in California, call 1-800-993-9400 or go to Remote Network Help.