To get fast remote assistance with data security problems, businesses in Campinas São Paulo have access to high-level troubleshooting from Progent's security professionals. Progent's remote support staff is available to offer efficient and low-cost help with security emergencies that threaten the productivity of your IT network. Progent's accredited engineers are certified to support systems based on Windows, Linux, Apple macOS and OS X, and popular versions of UNIX. Progent can provide expert guidance for vital cybersecurity and recovery solutions like AI-based EDR (End Point Protection and Response), MDR (Managed Detection and Response), full system restore validation, immutable backup, and off-site backup. Progent's wide selection of services addresses firewall expertise, email filtering and encryption, secure network infrastructure, and disaster recovery preparedness. Progent's support team has earned the world's most advanced security accreditations including CISA and CISSP.
Progent offers online security help on a by-the-minute model with no minimum minutes and without additional fees for sign-up or after hours service. By charging per minute and by providing top-level help, Progent's pricing model keeps expenses low and avoids scenarios where simple solutions entail big expenses.
Ransomware Hot Line: 800-462-8800
Ransomware needs time to steal its way through a network. Because of this, ransomware assaults are typically launched on weekends and at night, when support staff are likely to take longer to recognize a breach and are least able to mount a quick and coordinated response. The more lateral progress ransomware can manage within a victim's system, the more time it will require to recover core operations and damaged files and the more data can be exfiltrated to the dark web. Progent's Ransomware Hot Line is designed to help organizations to complete the time-critical first phase in mitigating a ransomware assault by putting out the fire. Progent's online ransomware experts can help you to locate and isolate infected servers and endpoints and protect clean resources from being penetrated. If your system has been penetrated by any strain of ransomware, don't panic. Get help quickly by calling Progent's Ransomware Hot Line at 800-462-8800.
Our System Has Been Attacked: What Should We Do?
If your business is currently fighting a network security crisis other than ransomware, go to Progent's Urgent Remote Technical Help to learn how to get fast assistance. Progent maintains a pool of certified cybersecurity specialists who can provide online and onsite support that includes threat containment, mitigation, restoration, forensics, and hardening of your security profile to protect against future exploits.
For organizations who have prepared beforehand for a security breach, the step-by-step post-attack response model promoted by GIAC is Progent's preferred method of reacting to a major security incident.
Introduction to Security Support Services
Managing data security plus preparedness for restoring critical data and systems following an attack demands an on-going process involving an array of tools and processes. Progent's security experts can assist your organization at all levels in your attempt to secure your IT network, ranging from security assessments to creating a complete security strategy. Important technologies covered by Progent's experts include Planning and Implementation, Data Recovery and Security Failure Analysis, and Outsourced Filtering of E-mail-Based Threats.
Planning and Building Secure Networks
Any organization ought to have a carefully considered security strategy that includes both preventive and reactive elements. The pre-attack plan is a set of steps that helps to reduce security gaps. The reactive strategy defines activities to assist IT staff to assess the damage caused by an attack, repair the damage, document the event, and revive business functions as soon as possible. Progent can advise you how to build protection into your company processes. Progent can install scanning utilities, define and execute a secure network architecture, and recommend procedures and policies that will optimize the safety of your computing environment. Progent's security professionals are ready to assist you to configure a firewall, design protected remote access to e-mail and data, and install an effective virtual private network (VPN).
If your company is interested in an economical way for outsourcing your network security management, Progent's 24x7 Network Support Services include automated online server tracking and fast resolution of problems.
Hybrid Cloud Solutions
Progent can assist your company you to plan, deploy, manage and repair enterprise hybrid cloud solutions that incorporate physical and cloud hosted infrastructure and that are compliant with regulatory security standards. (Find out about Progent's Microsoft 365 integration with on-premises installations of Exchange, Microsoft Azure enterprise hybrid cloud integration, Amazon Web Services (AWS) enterprise hybrid cloud solutions, and Google Cloud integration consulting.)
Data Restoration and Security Forensics
Progent offers expertise in restoring networks and devices that have been compromised, are suspect, or have ceased to function following a security penetration. Progent can show you how to assess the losses resulting from the breach, return your company to normal functions, and retrieve information compromised as a result of the assault. Progent's security specialists can also oversee a thorough forensic analysis by going over event logs and utilizing a variety of proven assessment techniques. Progent's experience with security consulting reduces your downtime and permits Progent to recommend effective strategies to avoid or contain future attacks.
Ransomware Removal and Recovery Consulting
Progent offers the help of experienced ransomware recovery experts with the skills to restore an IT network victimized by a ransomware cryptoworm such as Ryuk, Dharma, NotPetya, or MongoLock. To learn more, see ransomware cleanup and restoration expertise.
Work-from-Home Security Consulting
Work-from-Home (WFH) employees typically utilize their personal devices and often operate in a unsecured physical area. This situation multiplies their vulnerability to cyber threats and requires careful configuration of firewalls, AV tools, MFA-based identity verification, remote monitoring, intensive end-user education, and the creation of security policies based on best practices. Progent's seasoned group of at-home workforce solutions consultants can help you to design, configure and manage an effective security solution that guards vital IT resources in environments that incorporate remote workers and hybrid workers.
Software/Firmware Update Management Services
Progent's managed services for patch management offer organizations of all sizes a flexible and cost-effective solution for evaluating, validating, scheduling, implementing, and documenting updates to your dynamic IT system. In addition to optimizing the security and functionality of your computer environment, Progent's software/firmware update management services free up time for your IT staff to focus on line-of-business projects and tasks that derive maximum business value from your information network. Read more about Progent's software/firmware update management services.
Extended Detection and Response (XDR) Powered by SentinelOne
SentinelOne's Singularity portfolio is a subscription-based, cloud-centric cyberthreat management platform that includes computer learning algorithms and professional services to deliver comprehensive endpoint detection and response (Singularity EDR) and extended detection and response (Singularity XDR). SentinelOne's low-profile agents can be installed in minutes to defend popular endpoints against increasingly sophisticated cyberthreats such as ransomware, familiar and new malware, trojans, hacking tool sets, memory exploits, malicious scripts, destructive macros, and living-off-the-land (LotL) attacks. Progent is a SentinelOne Partner and dealer and oversees thousands of endpoints secured by SentinelOne Singularity technology. SentinelOne Singularity is invariably the first endpoint response software activated by Progent to provide control and visibility of a client's network in the first stages of a ransomware recovery. For more information, see Progent's SentinelOne-based Extended Detection and Response services.
Support for Horizon3.ai's NodeZero Pentest Products
NodeZero from Horizon3.ai is a cutting-edge penetration test (pentest) product family that can deliver repeated, concurrent, automated testing of your network so you can find, rank, fix, and confirm security vulnerabilities before threat actors can take advantage of them. NodeZero pentests can strategically deploy so-called tripwires like bogus credentials to detect whether your system is actively under attack across high-risk attack vectors. Tripwires provide sufficient information to make it possible to take action quickly with your incident response tools and procedures before an assailant can wreak havoc. Progent can provide the skills of a NodeZero Certified Operator (NCO) who can assist you to use NodeZero to carry out thorough pentests of your network perimeter and your internal IT infrastructure so you can determine your present security posture. Progent can also help you to harden your network security and can help you to design and implement a cohesive cybersecurity strategy that streamlines management and provides maximum cyber defense for on-premises, multi-cloud, and perimeter IT resources. To learn more information about Progent's vulnerability assessment services powered by on NodeZero's PEN test platform, refer to Consulting Services for NodeZero's Penetration Test Products.
Stealth Penetration (PEN) Security Evaluation Services
Stealth penetration testing is an important component of any comprehensive IT system security strategy. Progent's security experts can run extensive intrusion checks without the awareness of your organization's in-house network support staff. Unannounced penetration testing uncovers whether current security defense tools such as intrusion detection warnings and event history monitoring are correctly set up and consistently monitored. Progent can implement continuous automatic PEN testing to define your internal/external attack surface and to identify ways that exploitable vulnerabilities, improper configurations, compromised credentials, uninstalled patches, and ill-advised product defaults can be combined by threat actors into the multi-front attacks typical of the latest strains of ransomware. Get additional information about Progent's Stealth PEN Evaluation Services.
Progent's Flat-rate Managed Services for Information Assurance
Progent's affordable ProSight portfolio of network management outsourcing services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes SentinelOne's cutting edge behavior analysis tools to guard endpoint devices as well as servers and VMs against new malware assaults such as ransomware and file-less exploits, which routinely get by traditional signature-matching AV tools. ProSight ASM safeguards on-premises and cloud-based resources and offers a unified platform to address the complete malware attack progression including blocking, infiltration detection, mitigation, cleanup, and forensics. Key capabilities include one-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against newly discovered attacks. Progent is a certified SentinelOne Partner. Read more about Progent's
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection services deliver affordable in-depth protection for physical servers and VMs, workstations, smartphones, and Exchange Server. ProSight ESP utilizes contextual security and advanced heuristics for round-the-clock monitoring and responding to cyber threats from all vectors. ProSight ESP offers firewall protection, penetration alarms, endpoint management, and web filtering through cutting-edge tools packaged within a single agent accessible from a unified control. Progent's security and virtualization consultants can help you to plan and implement a ProSight ESP environment that addresses your organization's unique needs and that helps you prove compliance with government and industry data protection standards. Progent will assist you specify and configure security policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alarms that require urgent action. Progent can also help you to install and test a backup and restore solution such as ProSight Data Protection Services (DPS) so you can recover rapidly from a potentially disastrous security attack such as ransomware. Find out more about Progent's
ProSight DPS: Managed Backup and Recovery
Progent has partnered with leading backup technology companies to produce ProSight Data Protection Services, a family of subscription-based offerings that provide backup-as-a-service. All ProSight DPS products automate and monitor your data backup processes and allow non-disruptive backup and fast restoration of vital files/folders, applications, system images, and VMs. ProSight DPS helps your business avoid data loss resulting from hardware failures, natural disasters, fire, cyber attacks like ransomware, human error, ill-intentioned employees, or application glitches. Managed backup services in the ProSight Data Protection product line include ProSight Altaro VM Backup with immutable cloud storage, ProSight 365 Backup (formerly Altaro Office 365 Backup), ProSight DPS ECHO Backup based on Barracuda dedicated storage, and ProSight DPS MSP360 Cloud and On-prem Backup. Your Progent consultant can assist you to identify which of these managed services are most appropriate for your IT environment.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the infrastructure of top data security vendors to deliver centralized control and comprehensive protection for all your inbound and outbound email. The powerful structure of Progent's Email Guard managed service combines a Cloud Protection Layer with a local security gateway device to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne threats. The cloud filter serves as a preliminary barricade and blocks the vast majority of unwanted email from reaching your network firewall. This decreases your exposure to inbound threats and saves network bandwidth and storage. Email Guard's onsite security gateway appliance provides a deeper level of inspection for inbound email. For outbound email, the on-premises gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The onsite gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email that stays within your security perimeter. For more details, visit ProSight Email Guard spam filtering and data leakage protection.
ProSight Duo MFA: Two-factor Authentication (2FA) Services
Progent's Duo MFA services incorporate Cisco's Duo technology to defend against password theft through the use of two-factor authentication. Duo enables one-tap identity confirmation with Apple iOS, Google Android, and other out-of-band devices. Using Duo 2FA, whenever you sign into a protected online account and enter your password you are requested to confirm who you are via a device that only you have and that is accessed using a separate network channel. A wide selection of out-of-band devices can be used for this second form of ID validation such as an iPhone or Android or wearable, a hardware/software token, a landline phone, etc. You can register multiple verification devices. To learn more about ProSight Duo identity authentication services, visit Cisco Duo MFA two-factor authentication (2FA) services for at-home workers.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and applications hosted in a protected Tier III data center on a high-performance virtual host set up and managed by Progent's network support professionals. Under Progent's ProSight Virtual Hosting service model, the client retains ownership of the data, the operating system platforms, and the apps. Because the environment is virtualized, it can be moved easily to a different hardware solution without a lengthy and technically risky configuration procedure. With ProSight Virtual Hosting, you are not tied one hosting provider. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, maintain, find and protect data related to your IT infrastructure, processes, applications, and services. You can instantly find passwords or serial numbers and be alerted about impending expirations of SSL certificates or domains. By cleaning up and managing your IT documentation, you can eliminate as much as half of time spent trying to find vital information about your network. ProSight IT Asset Management includes a common location for storing and sharing all documents required for managing your business network like recommended procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for gathering and associating IT data. Whether you're planning improvements, doing maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the information you need as soon as you need it. Find out more details about Progent's ProSight IT Asset Management service.
Specialized Security Expertise Offered by Progent
Progent's security consultants can provide world-class expertise in key areas of IT protection such as:
Security Vulnerability Audits and Compliance Assessment
Progent provides experience with information risk auditing tools such as Microsoft Baseline Security Analyzer or LANguard from GFI for conducting a variety of comprehensive network scans to reveal potential security holes. Progent has broad experience with testing utilities and can help your company to understand assessment results and react appropriately. Progent's security engineers also can perform web application testing and can perform expert assessments of enterprise-wide security to determine your company's compliance with important industry security specifications including FISMA, PCI, and ISO 17799. Also, Progent can evaluate the strength of your wireless protection including in-place wireless equipment plus portable handsets. Get the details about Progent's Information Risk Evaluation and Security Compliance Testing.
Cisco Security, PIX and ASA Firewall, Virtual Private Network, Aironet and Meraki Wi-Fi Support
Progent's Cisco CCIE engineers and Cisco CCNP experts can deliver world-class consulting expertise for Cisco's entire family of protection and Virtual Private Network (VPN) solutions including PIX Series Firewalls and ASA 5500 Firewalls, the Catalyst Firewall Services Module, secure high-speed and IS routers, Aironet wireless access points, Meraki cloud-managed Wi-Fi APs, and Catalyst switches. Find out additional details about Cisco Protection, Virtual Private Network and Wireless Support.
Other Firewall and Virtual Private Network (VPN) Technologies
As well as supporting a wide array of protection solutions from Microsoft and Cisco, Progent offers companies of any size advanced engineering services for technologies from other major firewall and VPN suppliers. Progent's engineers can provide:
Certified Information Security Manager identifies the fundamental skills and international standards of performance that computer security professionals are required to achieve. CISM provides business management the assurance that those who have earned their certification have the experience and knowledge to provide effective security management and consulting services. Progent can provide a CISM-certified support professional to assist your organization in key security areas including data protection governance, vulnerability assessment, information security program management, and crisis handling support.
Get the details concerning Progent's CISM Security Consulting Expertise.
CISSP Security Support Services
Progent's CISSP experts are cybersecurity specialists who have earned CISSP accreditation through demonstrated experience, extensive study, and formal examination. CISSP Certification recognizes mastery of a worldwide standard for IT security. American National Standards Institute has given the CISSP credential accreditation in the area of information security under ISO/IEC 17024. Areas of knowledge included within CISSP include cybersecurity management procedures, security design and test systems, access permission methodology, applications development security, business processes security, hardware security, encryption, telecommunications, network security, and business continuity planning.
Read additional information concerning Progent's Certified Information Systems Security Professionals (CISSP) Support Services.
CISSP-ISSAP Certified Experts for Secure System Architecture
Progent's ISSAP Premier security consultants are specialists who have earned ISSAP accreditation following thorough examination and extensive experience. field experience with information security design. ISSAP consultants have in-depth understanding of access management systems and methodologies, telecommunications and network infrastructure security, cryptography, needs evaluation, business continuity planning (BCP) and disaster recovery planning (DRP), and physical security. Progent's ISSAP-premier security consultants can help your business with all phases of architecture security.
Read the details concerning Progent's ISSAP Certified Protected System Infrastructure Consulting Services.
CISSP-ISSEP Certified Security Engineering Experts
Cybersecurity consultants with CISSP-ISSEP (Information Systems Security Engineering Professional) certification have shown their ability to provide enterprises with the services expected of a senior systems engineer, information assurance systems engineer, information assurance officer, information assurance analyst, or senior cybersecurity analyst. Progent offers the support of a certified CISSP-ISSEP cybersecurity consultant to assist your organization to follow current system security engineering theory and techniques in system development, evaluate system security designs according to security engineering leading practices, create cohesive system designs that include compliant security features for all key system functions, develop efficient design and configuration strategies to deliver operational security, perform in-depth risk analysis, and propose practical security models that balance your operational goals with your company's tolerance for risk.
Find out more about Progent's CISSP-ISSEP Network Security Engineering Consulting Services.
Certified Information Systems Auditor (CISA) Consulting Expertise
The Certified Information Systems Auditor credential is a recognized achievement that represents mastery in information system security audit and control. Accredited by the American National Standards Institute, the CISA credential has candidates pass an exhaustive examination administered by the ISACA international professional association. Progent offers the services of a CISA-Certified security consultant trained to help businesses in the fields of IS audit services, information technology administration, systems and architecture planned useful life, IT support, protecting data resources, and business continuity planning.
Read more details concerning Progent's Certified Information Systems Auditor (CISA) Consulting Services.
CRISC Risk Mitigation Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA in 2010 to verify an IT professional's ability to design, implement, and maintain IS controls to reduce network risk. Progent can provide the expertise of a CRISC-certified consultant to help your company to create and carry out a workplace continuity or disaster recovery strategy based on industry best practices promoted by CRISC and crafted to match your organization's risk tolerance, business goals, and budgetary guidelines. Progent's network risk mitigation services are a good fit the support provided by Progent's CISA-Premier security engineers for impartially assessing your IS control mechanisms and with the services of Progent's CISM consultants for defining company-wide security policies.
Learn additional details concerning Progent's CRISC Risk Management Expertise.
Global Information Assurance Certification Support Expertise
GIAC was founded in 1999 to validate the knowledge of information technology security engineers. GIAC's mission is to ensure that an accredited security consultant has the skills necessary to deliver services in important categories of system, information, and application program security. GIAC certifications are acknowledged by companies and institutions throughout the world including U.S. National Security Agency (NSA). Progent offers the support of certified consultants for any of the network security disciplines addressed within GIAC accreditation programs such as auditing networks, incident handling, traffic analysis, web services security, and SIEM solutions.
Read additional details about Progent's GIAC Information Assurance Support.
Get in Touch with Progent for Network Security Consulting Services
If your organization is located in Campinas São Paulo and you're looking for computer security support services, phone Progent at
São Paulo Metro Contact Information:
Progent offers consulting services and onsite technical support throughout the great São Paulo metro area.
| City | Address | Phone | Link |
| Barueri-Alphaville | Alameda Rio Negro, 1477, Alphaville Industrial Barueri, SP 06454-040 Brazil |
+55 (11) 3181 7794 | Barueri-Alphaville Network Support Services |
| Campinas | R. Rafael Andrade Duarte, 104, Nova Campinas Campinas, SP 13092-180 Brazil |
+55 (19) 3500 2542 | Campinas Network Support Services |
| Guarulhos | R. João Gonçalves, 484, Centro Guarulhos, SP 07010-010 Brazil |
+55 (11) 3181 7402 | Guarulhos Network Support Services |
| Jundiaí | R. Barão de Teffé, 160, Jardim Ana Maria Jundiaí, SP 13208-760 Brazil |
+55 (11) 4230 0538 | Jundiaí Network Support Services |
| Santos | Av. Conselheiro Nébias, 754, Boqueirão Santos, SP 11015-001 Brazil |
+55 (13) 4040 4457 | Santos Network Support Services |
| São José dos Campos | Praça Chuí, 35, Vila Ema São José dos Campos, SP 12243-380 Brazil |
+55 (12) 3600 2496 | São José dos Campos Network Support Services |
| São Paulo | R. Tenerife, 31, Vila Olímpia São Paulo, SP 04548-040 Brazil |
+55 (11) 3197 4346 | São Paulo Network Support Services |
| Sorocaba | Av. Dr. Afonso Vergueiro, 1749, Centro Sorocaba, SP 18035-370 Brazil |
+55 (15) 3042 0807 | Sorocaba Network Support Services |