Cisco PIX security appliances and ASA 5500 Series firewalls combine comprehensive firewall, intrusion defense, and VPN functionality in a cost-effective, one-box package. Both of these product families have been superseded by the ASA 5500-X family of security appliances with Firepower. (See configuration and troubleshooting help with ASA 5500-X firewalls with Firepower Services.) Still, PIX and previous-generation ASA 5500 model firewalls are extensively deployed and continue to offer small and mid-size companies a viable firewall environment.

PIX and legacy ASA 5500 firewalls offer powerful client and application policy support, mutlivector attack defense, and safe connectivity services. The enhanced intelligence sharing of integrated protection features in a single package provides customers deploying these aggregated firewalls the benefits of enhanced protection, reduced cost of ownership, and minimal management expense.

Cisco PIX firewalls and Cisco's ASA 5500 Series combine with Cisco IOS Firewall, the FWSM for Catalyst 6500 Series switches, and Cisco 7600 Series routers as parts of Cisco's flexible, self-contained firewall line. Based on an expandable, building-block platform, each offering is equipped with a specific array of options to provide better security to a variety of network situations. These solutions can be independently installed to protect certain areas of the connectivity infrastructure, or can be grouped for a systematic, defense-in-depth strategy following the design leading practices described in the Cisco SAFE framework. Rounding out the modular firewall product line, Cisco has developed a comprehensive security management portfolio, spanning Cisco security device and IOS security features and embedded device managers, to standalone management utilities, moving to ensure that customers can effectively use their Cisco protection solution investments.

PIX Security Appliance Series
PIX firewall appliances deliver robust policy enforcement, multi-source invasion defense, and secure networking services in economical, easy-to-deploy solutions. These purpose-built appliances offer a broad range of integrated security and connectivity capabilities including application-aware firewall features, Voice over IP and multimedia protection, robust multi-location and remote-access IP Security VPN connectivity, high availability, intelligent networking services, and versatile administration options. The PIX Security Appliance Series product line ranges from compact plug-and-go desktop units for small or at home offices to stackable high-bandwidth appliances with ROI for enterprise and ISP customers, PIX firewalls provide dependable security, speed, and availability for environments of all sizes.

Cisco PIX Firewalls Consulting Firm

Based around a hardened, specialized operating system that offers a wealth of security services, PIX firewalls provide a high level of security and have received Common Criteria Evaluation Assurance Level (EAL) 4 status and ICSA Labs Firewall and IPsec certification. PIX firewall appliances provide security for a wide range of VoIP and other multimedia conventions including H.323 Version 4, Session Initiation Protocol, Cisco Skinny Client Control Protocol (SCCP), RTSP, and Media Gateway Control Protocol, enabling businesses to safeguard deployments of a broad array of current and next-generation VoIP and video applications.

Cisco PIX firewalls feature a wealth of configuration, tracking, and analysis options, providing IT managers the flexibility to use the methods that most closely match their requirements. Management solutions include common, policy-based administration tools, integrated web-based management, and compatibility with remote-monitoring standards such as SNMP and syslog. The integrated Cisco Adaptive Security Device Manager (ASDM) system offers a world-class web-accessible control platform that significantly streamlines the installation, ongoing configuration, and monitoring of a single Cisco PIX firewall without the need of any additional utility other than a standard web browser and Java plug-in to be running on a manager's PC.

IT managers can furthermore remotely configure, monitor, and troubleshoot Cisco PIX security appliances using a command-line interface. Safe command-line interface (CLI) access is possible through several methods including Secure Shell (SSHv2) Protocol, Telnet through IP Security (IPsec), and out-of-band via a console port. PIX firewalls also have dependable auto-update capabilities, a collection advanced secure remote-administration services that make sure that security settings and software images are always up to date.

Cisco Adaptive Security Appliances 5500 Series Firewalls
Cisco Adaptive Security Appliances (ASA) Firewalls are purpose-built devices that incorporate advanced, industry-leading security and Virtual Private Network services plus an adaptive design. The end product is a robust, versatile network protection appliance better suited to defend small and medium business (SMB) and enterprise networks and, simultaneously, reduce the total installation and maintenance expenses previously required for this high level of protection.

Cisco Adaptive Security Appliances (ASA) 5500 Series Firewalls Consultants
Cisco ASA 5500 Series Firewalls leverage engineering behind the PIX 500 Series Security Appliance, Cisco's IPS 4200 Series Intrusion Prevention System, and Cisco's VPN 3000 Series concentrator. These solutions enable the Cisco Adaptive Security Appliances Firewall product line to offer a platform that defends against a wide range of threats. Cisco Adaptive Security Appliances 5500 Series Firewalls deliver program security, local containment and control, and safe Virtual Private Network connectivity across the entire product line. This broad scope of security allows defense of any network section, including the most common threat conduits like remote sites, LAN-attached inside users, and off-site access VPNs.

Cisco Adaptive Security Appliances (ASA) firewalls deliver robust application security through intelligent, application-sensitive inspection processes that analyze network flows at Layers 4-7. This produces a more secure network covering web, voice, and mobile wireless services. To protect environments from application-layer attacks and to offer businesses greater policing of the applications and protocols used in their environments, these inspection engines incorporate extensive application and protocol knowledgebases and rely on protection enforcement solutions such as anomaly detection and state tracking. Also included are attack sensing and remediation technology such as application/protocol command filters and URL deobfuscation. Cisco ASA firewall inspection engines also deliver control over IM and tunneling applications, enabling organizations to police usage policies and recover network bandwidth for critical business processes.

At the same time as improving network security, Cisco ASA firewalls also lower deployment and support costs. By providing broad Virtual Private Network and security services, the Cisco Adaptive Security Appliances (ASA) 5500 Series firewall can be used as the the only platform for many uses, allowing platform commonality. The Cisco Adaptive Security Appliances (ASA) 5500 Series firewall can be used as a converged threat-prevention appliance at the datacenter by leveraging its access control, process inspection, and malicious assault mitigation capabilities. The Cisco ASA 5500 Series firewall can also be used as a dedicated remote access solution utilizing its Virtual Private Network features. Alternatively, the Cisco Adaptive Security Appliances firewall serves capably in the network interior for interdepartmental access management and to defend against malware internal users may inadvertently release into the network. In small business and branch office environments, the Cisco ASA 5500 Series firewall acts as a total solution device offering complete intrusion defense and Virtual Private Network services while fitting within the cost structure and operational demands of such situations.

This adaptive single-device, many-solution design reduces the total number of appliances that need to be installed and maintained while providing a common operating and administrative system throughout all deployments. This approach simplifies the education of configuration, monitoring, troubleshooting, and protection staff. To further minimize operations costs, Cisco Adaptive Security Appliances firewalls are also exceptionally network aware, enabling them to insert seamlessly into the network without interfering with legitimate traffic and applications.

How Progent's Consultants Can Help You with Cisco PIX and ASA Security Appliances
Cisco ASA Series adaptive security appliances and PIX family security appliances provide an array of configuration, tracking, and troubleshooting features that offer you the ability to set up these firewalls to align optimally with your business needs. Progent's CCIE certified network experts can assist you to maintain your existing infrastructure that includes Cisco ASA and/or PIX firewall technology and that offers protection, fault tolerance, throughput, and manageability. Progent's firewall experts can also help you to upgrade to Cisco ASA 5500-X firewalls with Firepower Services.

Progent's CISA and CISM-certified IS security professionals can help your business to create a security policy appropriate for your business and can set up your firewall to enforce your security policies. Progent's security assessment engineers can evaluate the strength of your existing firewall deployment and audit the overall security of your entire IT environment. Progent's Technical Response Center (TRC) can deliver emergency online troubleshooting for Cisco technology and offer fast access to a Cisco CCIE network engineer.

To see additional details concerning Progent's professional help for Cisco products, pick a topic:

Integration of Cisco and Third-party Firewall Technology
Progent offers expertise in firewall and VPN products from all major vendors and can help you integrate Cisco technology with additional security solutions to help you build a cost-effective network infrastructure that provides a level of security and flexibility appropriate for your business. Third-party firewall and VPN support services available from Progent include: If you wish to get in touch with Progent about technical expertise for Cisco products, call 1-800-993-9400 or visit Contact Progent.



An index of content::

  • Allentown Telecommuters Call Desk Outsourcing Expertise Allentown Bethlehem Easton Work from Home Employees Consultants nearby Allentown - Help Desk Call Center Outsourcing Consulting Services Lehigh County Pennsylvania

  • Small Business Server 2003 Remote Troubleshooting
    Microsoft Certified Expert SBS Specialists

    Microsoft Small Business Server is an affordable suite of essential servers that offers the foundation for a feature-rich but manageable information. The integration demands of the Microsoft .NET components bundled with Microsoft Small Business Server 2011 requires a network consultant with hands-on expertise and broad experience in planning and building cohesive and comprehensive information technology systems. Progent's Microsoft-certified experts have extensive backgrounds with the technologies incorporated in Microsoft SBS 2011 and Microsoft SBS 2008. This expertise ensures you success in installing, administering, and troubleshooting network environments powered by the Microsoft SBS suite of servers and programs.

  • Campinas Ransomware Preparedness Campinas, Sao Paulo Campinas Ransomware Sodinokibi Susceptibility Testing

  • 24x7x365 Catalyst Wi-Fi 6 and Wi-Fi 6E AP Planning Online Troubleshooting
    Catalyst 9162 Access Point Troubleshooting

    Progent's Cisco Catalyst 802.11ax Wi-Fi 6 and Wi-Fi 6E AP consultants can provide economical online and on-premises help for Catalyst Wi-Fi 6 and Wi-Fi 6E wireless access points.

  • Cisco IT Outsourcing Companies The valley Glendale Cisco Providers

  • VPN Configuration
    Cisco RADIUS Security Online Troubleshooting

    Cisco's security and offsite access solutions for small to mid-size businesses offer a complete array of easy-to-administer security products to help protect your entire network infrastructure. Cisco's VPN line includes switches, firewalls, and Virtual Private Network solutions. Progent's professional staff of consultants includes experienced specialists with Cisco's CCIE and Cisco Certified Network Professional qualifications who can assist your company to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that align most closely with your corporate goals.

  • Consultancy City Government Cisco County Government Exchange Services
  • PIX Firewall Migration Setup and Support
  • Consulting Experts for IT Support Companies - Los Angeles - Temporary Support Team Help Los Angeles Consulting Support for Computer Support Organizations Compton
  • Detroit, MI Urgent Detroit Dharma Crypto-Ransomware System-Restoration Detroit, MI Detroit Netwalker Crypto-Ransomware Business Recovery
  • Emergency Cabo Frio Ryuk Ransomware Data-Recovery Consultants Cabo Frio Cabo Frio Cabo Frio Egregor Ransomware Repair
  • Exchange 2013 Performance Tuning On-site Support Exchange 2013 Project Planning Professionals
  • Franklin County Ohio CentOS Linux, Sun Solaris, UNIX Support Outsourcing Redhat Linux, Sun Solaris, UNIX Online Support Services Columbus, OH
  • Cisco PIX Firewall Migration Technical Support Services
  • Hayward Crypto-Ransomware Settlement Consulting San Leandro, CA Hayward Avaddon Ransomware Negotiation Experts Union City, CA
  • ISA 2004 Server Professional ISA 2000 Server Consultant Services
  • Icaraí, Rio de Janeiro Windows Server 2012 Small Business Network Support Windows Server 2012 Small Business IT Consulting Firm
  • Immediate Work from Home Employees Consulting and Support Services - Long Beach - Help Desk Augmentation Consulting Services Long Beach Long Beach Offsite Workforce Help Desk Call Center Solutions Guidance Long Beach
  • Irving BlackBerry Software Configure Technology Consulting BlackBerry Email Irving
  • Long Island City Windows Server 2012 Repairing Windows 2008 Server Small Office Computer Consulting

  • PCLinuxOS Linux Professionals
    Top Consultancy Redhat Linux

    Progent's Linux consulting services provide small businesses and developers support for managing and maintaining Linux systems that operate with Microsoft-powered technology. Progent offers your business contact with Linux experts, consulting professionals premier by Microsoft and Cisco, and security experts with CISM credentials. This broad range of experience provides you with a convenient one-stop source to help you create and maintain a secure and robust cross-platform connectivity and communications environment that allows Linux and Microsoft coexistence by combining Microsoft Windows with major Linux derivatives such as RedHat Linux, SUSE, CentOS Linux, Ubuntu, PCLinuxOS, fedora Linux, Gentoo, Mandriva Linux, Debian GNU/Linux, and Slackware.

  • Manhattan Beach-Inglewood, California Debian Linux, Sun Solaris, UNIX Network Consultant Slackware Linux, Solaris, UNIX Integration Services Manhattan Beach-Redondo Beach
  • Melbourne Microsoft Dynamics GP-Software Migration Consultants Dynamics GP Dealer near Melbourne - Upgrades Programming and Support Melbourne
  • PIX Firewall Migration Support Outsourcing
  • Microsoft Certified Partner IT Consulting Group Microsoft Certified Partner Network Repair Service
  • Microsoft GP/Great Plains Troubleshooting Dynamics GP Great Plains Software Online Technical Support
  • Napa California, United States 24/7 Hermes Ransomware Hot Line 24-7 Dharma Ransomware Hot Line Vallejo, Benicia
  • Network Service Exchange Server 2013 Albany Exchange Server 2019 Computer Consultancy Company Albany-Clifton Park, New York
  • Offsite Workforce Consulting - Ontario - Cloud Integration Technology Consulting Services Ontario Rialto Hesperia Chino Ontario Ontario Work from Home Employees Cloud Solutions Guidance

  • Work at Home Support and Integration
    Remote Workforce Online Support

    Progent has two decades of experience helping small and mid-size companies to design, implement, tune, manage, and debug computer networks that support telecommuters.

  • Oklahoma SharePoint Computer Consultants After Hours SharePoint Network Support Company Oklahoma City, OK, US
  • Remote Support Services Telecommuter Services Teleworker Services Outsourcing

  • Forefront TMG On-site Technical Support
    Immediate IT Consulting Threat Management Gateway 2010

    Forefront Threat Management Gateway builds on the proven security capabilities of Microsoft Internet Security and Acceleration Server and offers a easily administered web gateway that delivers a one-server solution for an array of security features including an application layer and network layer firewall, URL monitoring and filtering, antimalware, intrusion protection, application proxy, VPN control, and HTTP/HTTPS inspection. Forefront Threat Management Gateway 2010 includes comprehensive web security logging and reporting features, permits customized reports powered by Microsoft SQL Server, works with Active Directory to simplify authentication and policy enforcement, and can be operated as a virtual server to cut costs and enhance availability. Progent's Microsoft engineers can help you to plan and execute test and production implementations; integrate Forefront Threat Management Gateway with Windows 2008 R2, Active Directory, SQL Server, Exchange Server 2010, and SharePoint 2010; set up Forefront Threat Management Gateway to run on a virtual server with Microsoft Windows Hyper-V; and provide ongoing support and repair services. Progent can also help your organization to migrate economically to Microsoft Forefront Threat Management Gateway 2010 from ISA Server.

  • Remote Workers Expertise near me in Fresno - Backup/Recovery Technology Guidance Fresno, CA At Home Workforce Consulting Services nearby Fresno - Backup/Recovery Technology Consulting and Support Services California Central Valley
  • Remote Workforce Assistance near Plano - Voice/Video Conferencing Systems Consulting Experts Plano, TX Offsite Workforce Plano Consultants - Voice/Video Conferencing Solutions Expertise Plano, Collin County
  • Integration Services PIX Firewall Upgrade
  • San Bernardino County California, U.S.A. Outsourcing IT BlackBerry Synchronization BlackBerry BES Server Network Support Ontario
  • Savannah Crypto-Ransomware Sodinokibi Preparedness Audit Savannah Garden City Savannah Crypto-Ransomware Locky Vulnerability Assessment Savannah Georgia

  • Microsoft Certified Remote Support Jobs
    Recruiter Microsoft Consultant Job Opening

    Progent wants to hire fulltime, solutions-oriented Microsoft certified consultants with MCSE credentials; Cisco certified system consultants with Cisco CCNP or CCIE credentials; security consultants with CISSP or CISA or equivalent security credentials; and advanced network architecture consultants with a background in mobile access, wireless networking, high uptime, disaster recovery, information preservation, and server virtualization. Progent also is hiring professionals who can join Progent's staff of desktop service technicians and off-site support professionals. Also, Progent is looking for experienced administrators who can perform effectively in our fast-paced, virtual office environment.

  • Security Network Security Audit Concord Security Consultant Danville, CA
  • Small Business Outsourcing IT Norfolk-Chesapeake 24-Hour Norfolk, Virginia Onsite and Remote Support
  • Specialists for Hayward Network Support Companies Hayward Consultants for Network Support Providers Castro Valley, CA
  • Spokane Avaddon Crypto-Ransomware Mitigation Spokane County Washington, US Spokane Hermes Crypto-Ransomware System-Restoration Spokane
  • Supplemetary IT Staffing for Network Support Groups Southfield, Michigan IT Staff Augmentation for Computer Support Groups Southfield-Ann Arbor, MI
  • Telecommuters Expertise nearby Lima - Integration Consulting Services Lima At Home Workers Lima Expertise - Infrastructure Consulting and Support Services
  • Top Ranked Windows 8.1 Upgrade Consult Windows 8.1 Storage Spaces Computer Installation
  • Top Rated Network Specialists Windows Server 2016 Windows 2019 Server Network Outsource Seattle Kirkland Everett, WA
  • Tucson At Home Workforce Security Solutions Guidance Tucson Arizona Remote Workforce Guidance near Tucson - Cybersecurity Systems Expertise
  • Vancouver , British Columbia Telecommuters Vancouver Consultants - IP Voice Technology Expertise Offsite Workforce Consulting and Support Services - Vancouver - IP Voice Systems Assistance Vancouver




  • Les Kent has a 35-year track record of effective network integration, business management, marketing, and operations. He has demonstrated a knack for creating elegant information technology solutions in his roles as as a network architect, software developer, project manager, deployment expert, and troubleshooter for small businesses, new ventures, and global enterprises.

  • Windows 7 Upgrade Outsourcing Microsoft Windows 7 Migration Network Consultant

  • Microsoft and Cisco Authorized Expert CIO Online Consulting
    CIO Technology Consulting Services

    Progent can provide small businesses with an information management professional who can function as a part-time CIO. This part-time CIO can provide strategic direction to help you deploy appropriate technology to enhance business operations so they match better with your business goals. Your business can create and implement a well conceived IT strategy without incurring the cost of a full-time senior IT executive.

  • Work from Home Employees Consulting Experts - Kansas City - Solutions Consultants Kansas City, Wyandotte County Work at Home Employees Consulting Services near Kansas City - Integration Solutions Consulting Services Kansas City, Wyandotte County

  • Best Consultant Juniper Junos J-Web
    Juniper Junos Configuration Computer Security Specialist

    Progent's Juniper Networks-authorized network engineer can help you to design and deploy Juniper Firewall/VPN technology, enhance and troubleshoot your infrastructure, and migrate smoothly from outdated devices to the latest versions. Progent's Junos OS consultants can provide support for Juniper's flagship network operating system to enable you to simplify the management and improve the security of your Juniper VPN devices and firewalls. Progent also has broad background supporting Juniper's NetScreen OS and ScreenOS software platforms and can help you manage networks that include a combination of Juniper's software platforms.


    © 2002-2025 Progent Corporation. All rights reserved.