For fast remote help with data security issues, businesses in Campinas São Paulo have access to world-class troubleshooting by contacting Progent's security engineers. Progent's online support consultants are available to provide effective and low-cost help with security issues that are impacting the productivity of your information system. Progent's accredited engineers are premier to support environments powered by Windows, Linux, macOS and OS X, and popular derivatives of UNIX. Progent can provide advanced support for key security and restoration solutions such as AI-driven End Point Protection and Response, Managed Detection and Response, full system restore testing, immutable backup, and off-site backup. Progent's broad range of consulting services addresses firewall technology, email filtering and encryption, secure network infrastructure, and disaster recovery preparedness. Progent's technical support team has been awarded the industry's top security credentials including Certified Information Security Manager (CISM) and Certified Information Systems Security Professional.
Progent offers online security assistance on a per-minute basis with no minimum minutes and without additional charges for sign-up or off-hour support. By billing per minute and by delivering world-class support, Progent's billing policy keeps expenses low and avoids situations where simple solutions entail major expenses.
Ransomware Hot Line: 800-462-8800
Ransomware requires time to work its way through a network. Because of this, ransomware assaults are commonly launched on weekends and late at night, when IT staff are likely to be slower to become aware of a break-in and are least able to mount a rapid and coordinated defense. The more lateral progress ransomware is able to achieve inside a victim's network, the longer it takes to recover basic operations and damaged files and the more data can be stolen and posted to the dark web. Progent's Ransomware Hot Line is designed to assist organizations to carry out the urgent first steps in mitigating a ransomware assault by putting out the fire. Progent's online ransomware engineers can help you to locate and quarantine breached devices and protect undamaged resources from being compromised. If your network has been breached by any version of ransomware, don't panic. Get immediate help by calling Progent's Ransomware Hot Line at 800-462-8800.
Our System Has Been Hacked: What Should We Do Now?
If your business is now experiencing a security emergency other than ransomware, go to Progent's Urgent Remote Technical Support to see how to get fast assistance. Progent has a team of veteran network security experts who offer online and on-premises assistance that includes containment, mitigation, restoration, forensics, and hardening of your security posture to protect against future exploits.
For organizations who have prepared beforehand for being hacked, the formal incident response model promoted by Global Information Assurance Certification is Progent's preferred method of reacting to a serious security penetration.
Introduction to Progent's Security Support Services
Coordinating computer security plus staying ready for restoring critical information and systems after a security breach requires a continual process that entails a variety of technologies and procedures. Progent's certified security experts can support your organization at whatever level in your attempt to secure your IT system, from security assessments to designing a comprehensive security program. Some technologies supported by Progent's security engineers include Security Planning and Implementation, Information Restoration and Security Failure Analysis, and Outsourced Filtering of E-mail-Borne Spam and Viruses.
Planning and Implementing Secure Environments
Every company should have a carefully thought out security strategy that incorporates both preventive and reactive activity. The proactive plan is a collection of steps that works to minimize security gaps. The post-attack plan specifies activities to assist IT staff to assess the losses caused by an attack, remediate the damage, document the event, and revive network functions as soon as possible. Progent can advise you how to incorporate protection into your business operations. Progent can install scanning utilities, define and execute a safe computer architecture, and propose processes and policies that will optimize the protection of your network. Progent's security experts are available to help you to configure a firewall, deploy safe online and mobile access to e-mail and data, and configure an effective VPN.
If you are looking for an economical way for outsourcing your network security management, Progent's Round-the-clock Network Support Packages include continual remote server tracking and immediate response to emergencies.
Hybrid Cloud Solutions
Progent can assist your company you to plan, implement, administer and troubleshoot enterprise hybrid cloud solutions that include local and cloud resources and that comply with government and industry security requirements. (Find out about Progent's Microsoft 365 integration with on-premises installations of Exchange, Microsoft Azure enterprise hybrid cloud integration, Amazon Web Services enterprise hybrid cloud solutions, and Google Cloud Platform planning and integration consulting.)
System Recovery and Security Forensics
Progent has expertise in recovering systems and computers that have been hacked, are in question, or have stopped working following a security penetration. Progent can show you how to determine the losses caused by the attack, restore ordinary business operations, and retrieve information compromised as a result of the assault. Progent's security specialists can also perform a thorough forensic analysis by examining activity logs and utilizing a variety of proven forensics techniques. Progent's background with security consulting minimizes your business disruption and permits Progent to recommend efficient strategies to avoid or contain future assaults.
Ransomware Removal and Recovery Consulting
Progent offers the help of seasoned ransomware recovery experts with the skills to reconstruct an environment that has suffered an attack by a ransomware cryptoworm like Ryuk, WannaCry, Hermes, or Locky. To learn more, see ransomware removal and recovery consulting.
Work-from-Home Security Consulting
Work-from-Home (WFH) employees commonly use their own devices and often work in a unsecured physical area. This situation increases their vulnerability to cyber threats and calls for judicious configuration of firewalls, anti-malware tools, MFA-based identity verification, remote endpoint monitoring, intensive user training, and the creation of policies based on best practices. Progent's veteran team of at-home workforce solutions consultants can assist you to plan, implement and maintain an effective security solution that guards critical information resources in networks that incorporate telecommuters and hybrid workers.
Patch Management Services
Progent's support services for software and firmware patch management offer businesses of any size a flexible and cost-effective solution for evaluating, validating, scheduling, applying, and tracking software and firmware updates to your ever-evolving IT network. Besides maximizing the protection and functionality of your computer environment, Progent's patch management services permit your IT team to concentrate on line-of-business projects and tasks that deliver maximum business value from your information network. Learn more about Progent's software/firmware update management support services.
Extended Detection and Response Powered by SentinelOne
SentinelOne's Singularity portfolio is a subscription-based, cloud-centered threat defense platform that features computer learning software and professional services to deliver comprehensive endpoint detection and response (Singularity EDR) and extended detection and response (Singularity XDR). SentinelOne's low-profile software agents can be loaded in a few minutes to protect endpoints against modern threats such as ransomware, familiar and brand-new malware, trojans, hacking tool sets, RAM exploits, malicious scripts, invasive macros, and living-off-the-land (LotL) abuse. Progent is a certified SentinelOne Partner and reseller and manages thousands of endpoints protected by SentinelOne technology. SentinelOne is always the first incident response software deployed by Progent to gain control and visibility of a customer's network in the first stages of a ransomware recovery. For more details, refer to Progent's SentinelOne-based Extended Detection and Response consulting.
Expertise with Horizon3.ai's NodeZero PEN Testing Solutions
NodeZero from Horizon3.ai is a cutting-edge penetration test (pentest) platform that supports continuous, simultaneous, programmable assessment of your network to help you expose, rank, fix, and verify security weaknesses before malicious hackers can take advantage of them. NodeZero pentests can plant decoys called tripwires like fake files or credentials to detect whether your system is actively under attack across common attack paths. Tripwires provide sufficient detail to make it possible to react quickly with your SIEM workflows before an assailant can wreak havoc. Progent can provide the expertise of a NodeZero Certified Operator who can assist you to deploy NodeZero to perform thorough penetration tests of your perimeter and your internal network so you can evaluate your current security posture. Progent can also assist you to strengthen your network security and can assist you to plan and implement a unified cybersecurity ecosystem that streamlines management and delivers maximum protection for on-premises, multi-cloud, and perimeter IT resources. To learn more information about Progent's threat analysis solutions powered by on NodeZero's pentest products, refer to Consulting Support for NodeZero's Pentest Platform.
Stealth Penetration (PEN) Security Testing Services
Stealth penetration testing is a key part of any comprehensive IT system security plan. Progent's security professionals can perform extensive penetration checks without the knowledge of your organization's internal network support resources. Stealth penetration checking shows whether existing security monitoring systems such as intrusion incident alerts and event log analysis are properly set up and actively monitored. Progent can implement ongoing autonomous PEN testing to define your internal/external attack surface and to detect ways that exploitable vulnerabilities, improper configurations, compromised credentials, uninstalled patches, and ill-advised product defaults can be combined by threat actors into the multi-front attacks typical of modern variants of ransomware. Get additional information about Progent's Stealth PEN Testing Experts.
Progent's Flat-rate Managed Services for Information Security
Progent's value-priced ProSight line of managed services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection (EPP) service that utilizes SentinelOne's next generation behavior machine learning technology to guard endpoints and physical and virtual servers against new malware assaults such as ransomware and email phishing, which routinely get by traditional signature-based anti-virus products. ProSight Active Security Monitoring protects local and cloud-based resources and provides a single platform to address the entire threat lifecycle including filtering, detection, mitigation, remediation, and post-attack forensics. Key features include single-click rollback using Windows Volume Shadow Copy Service and automatic system-wide immunization against newly discovered threats. Progent is a certified SentinelOne Partner. Learn more about Progent's
ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) services offer economical multi-layer protection for physical servers and virtual machines, desktops, smartphones, and Exchange email. ProSight ESP uses contextual security and advanced machine learning for round-the-clock monitoring and reacting to cyber threats from all vectors. ProSight ESP offers two-way firewall protection, intrusion alerts, endpoint management, and web filtering through cutting-edge technologies incorporated within one agent managed from a unified console. Progent's security and virtualization consultants can help your business to plan and implement a ProSight ESP environment that addresses your company's unique needs and that helps you prove compliance with government and industry data protection standards. Progent will help you define and configure security policies that ProSight ESP will manage, and Progent will monitor your network and respond to alerts that require immediate action. Progent's consultants can also assist you to set up and test a backup and restore solution such as ProSight Data Protection Services (DPS) so you can recover rapidly from a destructive cyber attack such as ransomware. Read more about Progent's
ProSight Data Protection Services: Managed Cloud Backup and Recovery
Progent has partnered with advanced backup product vendors to produce ProSight Data Protection Services (DPS), a family of subscription-based management offerings that provide backup-as-a-service (BaaS). All ProSight DPS products manage and monitor your backup processes and allow transparent backup and fast restoration of important files/folders, apps, images, plus VMs. ProSight DPS lets you avoid data loss caused by equipment failures, natural disasters, fire, cyber attacks such as ransomware, user error, malicious employees, or software glitches. Managed services available in the ProSight Data Protection selection include ProSight Altaro VM Backup with immutable cloud storage, ProSight 365 Backup (formerly Altaro Office 365 Backup), ProSight ECHO Backup using Barracuda dedicated storage, and ProSight MSP360 Hybrid Backup. Your Progent consultant can help you to identify which of these managed services are best suited for your IT environment.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the infrastructure of top information security vendors to deliver centralized control and world-class security for all your email traffic. The hybrid structure of Email Guard managed service integrates cloud-based filtering with a local gateway appliance to offer complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. Email Guard's cloud filter serves as a preliminary barricade and keeps the vast majority of unwanted email from reaching your network firewall. This reduces your vulnerability to inbound attacks and conserves network bandwidth and storage space. Email Guard's onsite security gateway device provides a further layer of inspection for inbound email. For outgoing email, the local security gateway offers AV and anti-spam filtering, protection against data leaks, and email encryption. The onsite security gateway can also help Exchange Server to monitor and safeguard internal email traffic that stays inside your security perimeter. For more information, see Email Guard spam and content filtering.
ProSight Duo MFA: Two-factor Authentication Services
Progent's Duo MFA services utilize Cisco's Duo technology to protect against password theft through the use of two-factor authentication. Duo supports one-tap identity confirmation on iOS, Android, and other out-of-band devices. With 2FA, whenever you log into a protected application and give your password you are requested to confirm your identity on a unit that only you have and that uses a different ("out-of-band") network channel. A wide selection of out-of-band devices can be utilized for this added means of authentication such as a smartphone or watch, a hardware token, a landline phone, etc. You can designate several verification devices. For details about ProSight Duo two-factor identity authentication services, refer to Cisco Duo MFA two-factor authentication services for telecommuters.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a protected fault tolerant data center on a high-performance virtual machine host set up and maintained by Progent's IT support professionals. With the ProSight Virtual Hosting service model, the client retains ownership of the data, the OS software, and the apps. Because the environment is virtualized, it can be ported immediately to a different hosting environment without a lengthy and difficult configuration procedure. With ProSight Virtual Hosting, you are not tied a single hosting provider. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, maintain, retrieve and protect data about your network infrastructure, processes, business apps, and services. You can instantly locate passwords or serial numbers and be warned about impending expirations of SSL certificates or domains and warranties. By cleaning up and organizing your IT infrastructure documentation, you can eliminate as much as half of time thrown away looking for vital information about your IT network. ProSight IT Asset Management features a common location for storing and collaborating on all documents related to managing your network infrastructure such as recommended procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and associating IT data. Whether you're planning enhancements, performing regular maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the knowledge you need when you need it. Find out more details about ProSight IT Asset Management service.
Special Security Services Offered by Progent
Progent's veteran engineers can provide unique support in key areas of computer security including:
Security Vulnerability Audits and Compliance Assessment
Progent offers experience with information risk evaluation tools such as Microsoft Baseline Security Analyzer or LANguard for conducting a variety of automatic network scans to identify possible security holes. Progent has broad skills with scanning tools and can assist your company to understand assessment reports and respond efficiently. Progent's certified security consultants also provide web software validation and can conduct thorough assessments of corporate-wide security to determine your company's compliance with important global security specifications including HIPAA, PCI, and ISO. Also, Progent can evaluate the effectiveness of your wireless protection including in-place wireless equipment plus mobile handsets. Read more details about Progent's Security Vulnerability Audits and Security Compliance Assessment.
Cisco Security, PIX Firewall and ASA Firewall, Virtual Private Network (VPN), Aironet and Meraki Wireless Support
Progent's Cisco Certified Internetwork Experts and Cisco CCNP experts can deliver world-class consulting expertise for Cisco's entire family of security and VPN technologies including PIX Series Firewalls and ASA 5500 Series Firewalls, Catalyst Firewall Services Module (FWSM), secure high-speed and integrated services (IS) routers, Aironet wireless access points and bridges, Meraki cloud-managed Wi-Fi access points, and Catalyst Series switches. Read more information concerning Cisco Protection, Virtual Private Network and Aironet Wireless Help.
Other Firewall and VPN Technologies
As well as being expert in a wide range of security technologies available from Microsoft and Cisco, Progent can provide businesses of all sizes top-level support for security products from other popular firewall and Virtual Private Network vendors. Progent's engineers can provide:
Learn additional information concerning Progent's CISM Security Consulting Services.
CISSP Security Consulting Expertise
Progent's Certified Information Systems Security Professionals (CISSPs) are cybersecurity specialists who have been awarded CISSP status through verified professional work, extensive study, and formal testing. CISSP qualification indicates expertise in an international standard for IT security. American National Standards Institute has given the CISSP status official recognition in the area of IT security under ISO/IEC 17024. Areas of knowledge covered within CISSP include cybersecurity administration practices, security design and models, access permission systems, applications development security, business processes security, physical security, cryptography, telecommunications, Internet security, and business continuity planning.
Read more information concerning Progent's CISSP Consulting Services.
CISSP-ISSAP Premier Experts for Secure System Architecture
Progent's ISSAP Certified security consultants are specialists who have been awarded ISSAP certification as a result of thorough testing and extensive hands-on work with network security design. ISSAP security experts have acquired comprehensive understanding of access control systems and techniques, phone system and network protection, cryptography, requirements analysis, business continuity planning (BCP) and disaster recovery planning (DRP), and physical security integration. Progent's ISSAP-premier security consultants can help your company with all aspects of secure network architecture.
Learn additional information about Progent's ISSAP Accredited Secure System Infrastructure Consulting Support.
CISSP-ISSEP Certified Security Engineering Consultants
Cybersecurity consultants with CISSP-ISSEP (Information Systems Security Engineering Professional) certification have proven their ability to provide large organizations with the expertise expected of a senior systems engineer, information assurance systems engineer, information assurance officer, information assurance analyst, or senior cybersecurity analyst. Progent offers the support of a certified CISSP-ISSEP cybersecurity consultant to help your organization to follow current system security engineering principles and techniques in system development, review system security designs according to cybersecurity engineering leading practices, create cohesive system designs that incorporate compliant cybersecurity features for all key system functions, define efficient design and configuration strategies to provide operational security, perform in-depth risk analysis, and recommend realistic security models that balance your operational goals with your company's risk tolerance.
Find out the details about Progent's CISSP-ISSEP Network Security Engineering Consulting Services.
Certified Information Systems Auditor (CISA) Professional Expertise
The Certified Information Systems Auditor accreditation is a globally recognized qualification that signifies expertise in network security audit and control. Accredited by ANSI, the CISA accreditation requires that consultants pass an extensive test administered by the ISACA international professional group. Progent offers the services of a CISA-Certified security consultant able to assist businesses in the fields of IS audit services, IT administration, systems and infrastructure lifecycle, information technology service delivery, safeguarding data assets, and disaster recovery preparedness.
Read additional details about Progent's Certified Information Systems Auditor (CISA) Professional Services.
CRISC IT Risk Management Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA in 2010 to verify an IT professional's ability to plan, implement, and maintain IS control mechanisms to mitigate risk. Progent offers the expertise of a CRISC-certified engineer to assist you to develop and execute a business continuity or disaster recovery plan that follows leading practices identified by CRISC and geared to align with your company's risk tolerance, business objectives, and IT budget. Progent's risk mitigation expertise is complementary to the services provided by Progent's CISA-Certified security engineers for objectively assessing your IT control design and with the expertise of Progent's CISM-certified experts for implementing company-wide security policies.
Get additional details about Progent's CRISC-certified IT Risk Mitigation Expertise.
GIAC (Global Information Assurance Certification) Consulting Services
GIAC was established in 1999 to certify the skill of information technology security professionals. GIAC's goal is to assure that an accredited security consultant has the knowledge appropriate to deliver support in critical categories of network, data, and application security. GIAC accreditations are recognized by companies and government organizations around the world including U.S. NSA. Progent can provide the support of GIAC certified consultants for any of the network security disciplines covered within GIAC certification topics such as assessing perimeters, incident handling, traffic analysis, web-based application security, and security information and event management (SIEM) solutions.
Read more information about Progent's GIAC Information Assurance Services.
Get in Touch with Progent for Computer Security Support
If your business is located in Campinas São Paulo and you want computer security expertise, call Progent at
São Paulo Metro Contact Information:
Progent offers consulting services and onsite technical support throughout the great São Paulo metro area.
City | Address | Phone | Link |
Barueri-Alphaville | Alameda Rio Negro, 1477, Alphaville Industrial Barueri, SP 06454-040 Brazil |
+55 (11) 3181 7794 | Barueri-Alphaville Network Support Services |
Campinas | R. Rafael Andrade Duarte, 104, Nova Campinas Campinas, SP 13092-180 Brazil |
+55 (19) 3500 2542 | Campinas Network Support Services |
Guarulhos | R. João Gonçalves, 484, Centro Guarulhos, SP 07010-010 Brazil |
+55 (11) 3181 7402 | Guarulhos Network Support Services |
Jundiaí | R. Barão de Teffé, 160, Jardim Ana Maria Jundiaí, SP 13208-760 Brazil |
+55 (11) 4230 0538 | Jundiaí Network Support Services |
Santos | Av. Conselheiro Nébias, 754, Boqueirão Santos, SP 11015-001 Brazil |
+55 (13) 4040 4457 | Santos Network Support Services |
São José dos Campos | Praça Chuí, 35, Vila Ema São José dos Campos, SP 12243-380 Brazil |
+55 (12) 3600 2496 | São José dos Campos Network Support Services |
São Paulo | R. Tenerife, 31, Vila Olímpia São Paulo, SP 04548-040 Brazil |
+55 (11) 3197 4346 | São Paulo Network Support Services |
Sorocaba | Av. Dr. Afonso Vergueiro, 1749, Centro Sorocaba, SP 18035-370 Brazil |
+55 (15) 3042 0807 | Sorocaba Network Support Services |