Small business information networks in the state of Florida can have prompt and affordable remote access to Progent's accredited security support specialists to fix critical security problems. Rates are affordable, billing is by the minute, engagement is quick, and support is world class. Progent also offers help for complex engagements that requires the services of senior security engineers with top security certifications.
If your Florida office is based some distance from major urban areas like Jacksonville, Miami, Tampa, St. Petersburg, Hialeah, or Orlando, the availability of local accredited network security experts could be limited during a crisis. This can cause a loss of productivity for your company, upset clients, idle workers, and defocused management. By contacting Progent's remote support, you have access to a Premier security engineer ready to deliver help when you need it to get your network operating and restore your information.
Progent can help you in a variety of ways in your efforts to defend your IT environment with support services that can range from security audits to creating a comprehensive security strategy. Progent offers affordable support to assist small and midsize companies to configure and maintain safe IT environments powered by Windows and Cisco technology and that may include computers running UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus mobile clients with Apple iPhones and iPads or Google Android or Windows Phone smart phones and tablets.
Progent can also help you outsource spam blocking and defense against e-mail-based assaults. Email Guard is Progent's email security platform that uses the technology of leading information security companies to deliver centralized control and comprehensive security for your inbound and outbound email. The hybrid structure of Progent's Email Guard managed service combines a Cloud Protection Layer with an on-premises security gateway device to offer complete protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-based malware. The cloud filter acts as a preliminary barricade and blocks the vast majority of unwanted email from reaching your network firewall. This decreases your exposure to inbound attacks and conserves system bandwidth and storage space. ProSight Email Guard's onsite security gateway device provides a deeper level of analysis for incoming email. For outgoing email, the local gateway offers anti-virus and anti-spam filtering, protection against data leaks, and encryption. The on-premises security gateway can also enable Exchange Server to track and safeguard internal email traffic that stays within your corporate firewall.
Progent's certified consultants are available online or on site to offer a variety of emergency or longer-term IT security services such as:
If your company has an emergency need for computer security support, go to Progent's Emergency Online Network Help.
- Perform automated network security audits
- Clean up quickly after virus and worm attacks
- Install and troubleshoot firewalls
- Implement secure techniques for remote and mobile connectivity
- Deploy effective utilities for defense against spam and directory harvest attacks
- Help create a company-wide security plan with proactive network monitoring
- Offer outsourced Help Desk Call Center Services
- Develop a practical data backup and disaster recovery strategy built around Data Protection Manager backup technology
Progent's consultants can deliver advanced support in key areas of computer protection including analysis, firewall and VPN expertise, and high-level security consulting.
Progent's certified security consultants can evaluate the strength of your current computer security systems through exhaustive remote automated analysis based on sophisticated software tools and tested procedures. Progent's experience in this testing saves your company time and money and offers a detailed portrayal of weaknesses. The knowledge your company is provided can form the foundation of a security strategy that will permit your network to run safely and respond quickly to new threats.
Automated Network Vulnerability Audits
Progent offers expertise in the use of security evaluation software including Microsoft's MBSA and GFI LANguard NSS for economically running a set of automatic system auditing scans to identify potential security holes. Progent has broad knowledge of other security auditing products including NMAP Port Scanner, AMAP, eEye, as well as tools like SolarWinds, Hydra, and Nikto. Progent can help you to understand testing reports and respond effectively.
Progent can show you how to build protection into your company processes, install scanning applications, plan and deploy a protected network environment, and recommend procedures to optimize the safety of your network. Progent's security consultants are ready to help you configure a firewall, implement secure remote connectivity to email and data, and install VPN. Learn more on Progent's automated security audits.
Security Inventory and Evaluation Bundles for Small Companies
Progent has put together two low-cost security inventory and evaluation packages designed to allow small companies to receive an impartial network security evaluation from a qualified security specialist. With Progent's External Network Security Inventory Checkup, a security engineer administers a comprehensive examination of your IT infrastructure from beyond your firewall to determine possible weaknesses in the security profile you present to the outside world. With Progent's Internal Security Inventory Scan, a security engineer executes a network scan from a secure computer inside your firewall to determine your exposure to inside assaults. Both security inventory packages are set up and executed from a secured remote location. The project is overseen by an engineer with high-level security credentials and who generates a document that summarizes and interprets the information captured by the security scan and suggests cost-effective remediation if called for.
Stealth Security Penetration Testing Consulting
Stealth intrusion testing is a key part of any comprehensive network security strategy. Progentís security professionals can run extensive penetration checks without the awareness of your company's internal IT staff. Unannounced penetration checking shows whether current security monitoring systems such as intrusion detection alerts and event log analysis are correctly set up and actively monitored. Find out additional information about Progent's stealth security penetration testing support services.
Firewalls and VPN Support
Progent's background in network security solutions encompasses extensive field work with major firewalls and VPN products offered by a variety of companies such as Cisco, Microsoft, and CheckPoint. Progent offers the support of engineers with key networking certifications including CCIE and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Debugging
The latest generation of ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer significantly more value than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX firewalls for all new installations. Following Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort technology, which is the market's most deployed intrusion protection system. Firepower services provide enhanced capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist you to maintain your existing PIX or ASA 5500 firewalls and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your organization to design, deploy, tune, manage and debug firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. See more details about Cisco ASA Firewalls with Firepower configuration and troubleshooting services.
Cisco Security and Virtual Private Network Engineering Services
Cisco's security and remote connection products offer a complete range of manageable security solutions to help safeguard your wired and wireless network infrastructure. Cisco's VPN product family features routers, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's expert staff of consultants includes experienced specialists with Cisco's Certified Internetwork Expert and CCNP qualifications who are able to help your business to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that align most closely with your business goals. Learn more details concerning Progent's Consulting Expertise for Cisco Security and Virtual Private Network Appliances.
Consulting Services for Additional Firewall and Virtual Private Network Solutions
Progent provides small and mid-size businesses professional support for Intrusion Protection Systems and IPsec VPN products from leading firewall and Virtual Private Network security companies including WatchGuard, Juniper, and Symantec. Progent can show you how to create a detailed security plan and choose appropriate technologies from multiple suppliers to support your security objectives while sticking within your budget limits.
Progent's Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight series of network monitoring and management services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection (EPP) service that incorporates next generation behavior-based machine learning tools to defend endpoint devices as well as servers and VMs against modern malware attacks like ransomware and file-less exploits, which easily get by legacy signature-matching anti-virus tools. ProSight ASM safeguards on-premises and cloud-based resources and provides a single platform to address the entire malware attack progression including protection, detection, containment, cleanup, and post-attack forensics. Top features include single-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
ProSight Enhanced Security Protection (ESP) services offer ultra-affordable in-depth security for physical servers and VMs, workstations, smartphones, and Exchange Server. ProSight ESP utilizes adaptive security and advanced machine learning for round-the-clock monitoring and responding to security threats from all vectors. ProSight ESP delivers firewall protection, intrusion alerts, endpoint management, and web filtering via leading-edge tools incorporated within a single agent accessible from a single control. Progent's data protection and virtualization experts can help your business to plan and configure a ProSight ESP deployment that addresses your company's specific needs and that allows you achieve and demonstrate compliance with legal and industry information protection regulations. Progent will help you specify and configure security policies that ProSight ESP will manage, and Progent will monitor your network and react to alarms that call for immediate attention. Progent can also help you to set up and verify a backup and restore system such as ProSight Data Protection Services so you can get back in business quickly from a destructive cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Microsoft Exchange filtering.
ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services from Progent provide small and mid-sized organizations an affordable and fully managed solution for secure backup/disaster recovery (BDR). Available at a fixed monthly rate, ProSight Data Protection Services automates and monitors your backup processes and enables fast recovery of critical files, applications and VMs that have become unavailable or damaged as a result of hardware breakdowns, software bugs, disasters, human mistakes, or malware attacks like ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, applications, system images, as well as Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local device, or to both. Progent's backup and recovery specialists can provide world-class expertise to configure ProSight DPS to be compliant with government and industry regulatory requirements like HIPPA, FIRPA, and PCI and, whenever needed, can assist you to restore your critical information. Learn more about ProSight Data Protection Services Managed Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the infrastructure of leading information security companies to provide centralized control and comprehensive protection for all your email traffic. The hybrid structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with an on-premises gateway appliance to provide advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based threats. The cloud filter serves as a preliminary barricade and keeps the vast majority of threats from reaching your network firewall. This decreases your exposure to external attacks and conserves system bandwidth and storage space. Email Guard's on-premises gateway device adds a deeper level of analysis for inbound email. For outbound email, the onsite security gateway offers AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The local gateway can also help Microsoft Exchange Server to monitor and protect internal email that originates and ends within your corporate firewall. For more details, see ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and apps hosted in a secure fault tolerant data center on a fast virtual machine host configured and managed by Progent's IT support experts. Under Progent's ProSight Virtual Hosting service model, the client owns the data, the operating system software, and the apps. Since the environment is virtualized, it can be ported immediately to an alternate hosting solution without requiring a lengthy and technically risky configuration process. With ProSight Virtual Hosting, your business is not locked into a single hosting service. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, maintain, retrieve and safeguard data about your network infrastructure, processes, applications, and services. You can quickly locate passwords or IP addresses and be alerted automatically about upcoming expirations of SSLs or warranties. By updating and organizing your IT documentation, you can eliminate as much as half of time thrown away trying to find vital information about your network. ProSight IT Asset Management includes a common repository for holding and sharing all documents related to managing your network infrastructure such as recommended procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for gathering and associating IT data. Whether youíre planning improvements, doing regular maintenance, or responding to a crisis, ProSight IT Asset Management gets you the data you need when you need it. Learn more details about ProSight IT Asset Management service.
Expert Security Design
Every business should develop a thoroughly considered security strategy that incorporates both pre-attack processes and response plans. The proactive plan is a set of procedures designed to minimize security weaknesses. The post-attack plan assists your company's network security personnel to assess the damage resulting from a security penetration, repair the system, document the event, and get the IT network operational as rapidly as possible.
Progent's expert IS security engineers are available to help you to run a full vulnerability assessment and define a computer security plan to implement security processes and controls to minimize future attacks and threats.
CISM Qualified Information Security Support Services
The CISM organization defines the core capabilities and international standards of performance that IT security managers are expected to master. CISM gives executive management the confidence that those who have earned their CISM certification have the background and capability to provide efficient security administration and support services. Progent offers the support of CISM Certified security consultants to help businesses with:
Read more details concerning Progent's CISM Qualified Security Support Services.
- Network Security Processes
- Vulnerability Analysis
- Network Security Implementation Management
- Information Security Administration
- Response Planning
CISSP Certified Security Engineering Expertise
CISSP certification denotes expertise with an international standard for information security. ANSI (American National Standards Institute) has awarded the CISSP credential recognition in the area of data security under ISO/IEC 17024. Progent offers the services of security consultants who have earned CISSP accreditation. Progent can give you access to a CISSP-certified consultant to help your company in a variety security areas such as:
Read additional information concerning Progent's CISSP-certified Information Security Consulting Professionals.
- Security Administration Practices
- Security Infrastructure and Paradigms
- Access Management Systems and Methodology
- Applications Development Security
- Operations Security
- Site Security
- Encryption/Decryption Mechanisms
- Telecom, Network and Internet Security
- Business Continuity Preparedness
CISSP-ISSAP Certified Secure Network Architecture Engineering Services
Progent's CISSP-ISSAP Premier IT architecture professionals are experts who have been awarded ISSAP status as a result of thorough testing and extensive experience with network security architecture. The Information System Security Architecture Professional (ISSAP) credential represents demonstrated mastery in the most in-depth requirements of information system security architecture within the wider field of information security expertise needed for CISSP certification. Progent's ISSAP-premier security specialists can assist your business with all phases of architecture security including.
Learn additional details concerning Progent's ISSAP Certified Secure System Architecture Support Professionals.
- Access Control Mechanisms and Techniques
- Telecommunications and Network Infrastructure Security
- Cryptography Solutions
- Requirements Evaluation and Security Guidelines
- Business Continuity Planning and DRP
- Site Security
CISA Certified IS Security Auditing Consulting Expertise
The CISA credential is a recognized achievement that signifies mastery in information system security audit and control. Certified by ANSI, the CISA credential has consultants pass an extensive test given by the ISACA international professional group. Progent's CISA-certified network security audit experts are available to help your IT organization in the areas of:
Read more details about Progent's CISA Accredited IS Security Auditing Consulting Expertise.
- IS Audit Process
- Information Technology Governance
- Systems and Infrastructure Planned Useful Life
- IT Service Delivery
- Safeguarding Data Resources
- Business Continuity Preparedness
Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC program was established by ISACA to verify an IT professional's ability to plan, implement, and maintain information system control mechanisms to reduce network risk. Progent offers the services of a CRISC-certified consultant to assist your company to create and execute a workplace continuity or disaster recovery strategy that follows leading practices identified by CRISC and crafted to align with your company's risk appetite, business goals, and IT budget. Progent's CRISC-certified IT risk mitigation specialists can provide a variety of risk identification services such as:
Learn additional details about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Gather information and review documentation to evaluate significant risk scenarios
- Inventory legal, industry, and contractual requirements and organizational standards associated with your network to assess their potential influence on your business goals
- Point out potential vulnerabilities for your business workflows to help in analyzing your corporate risk
- Develop a risk awareness program and conduct seminars to ensure your stakeholders understand IS risk so they can assist with your risk control process
- Connect key risk scenarios to related operational processes to help assign risk responsibility
- Validate risk appetite with executive leadership and key stakeholders to make sure they match
GIAC Qualified IS Security Consulting Services
Find out additional details concerning Progent's GIAC Information Assurance Services.
GIAC was founded in 1999 to validate the skill of network security engineers. GIAC's goal is to make sure that a certified security consultant has the knowledge needed to deliver support in key areas of system, data, and application software security. GIAC certifications are acknowledged by businesses and government organizations around the world including and the United States NSA. Progent's GIAC information security audit engineers are available to help your company with:
Talk to a Progent Security Engineer
To see how you can access a certified Progent security engineer for online or on-premises support in Florida, call 1-800-993-9400 or go to Remote Computer Support.