Company IT networks in the state ofFloridacan now get fast and affordable remote access to Progent's accredited security engineers to fix the toughest security problems. The cost is competitive, charges are by the minute, sign-up is fast, and service is world class. Progent also offers help for long-term engagements that demand the knowledge of seasoned security consultants with top security credentials.
If yourFloridanetwork is situated far from major urban areas includingJacksonville, Miami, Tampa, St. Petersburg, Hialeah, or Orlando, the availability of nearby accredited network security experts may be limited when you have an emergency. This can result in lost income for your business, upset clients, unproductive workers, and distracted management. By calling Progent, you can get in touch with a Certified security engineer who can offer help when you require it to keep your computer network on line and restore your information.
Progent can help you at any level in your initiatives to defend your information system with support services that ranges from network security checks to developing a comprehensive security strategy. Progent offers affordable support to assist small and midsize companies to configure and maintain safe networks powered by Windows and Cisco technology and that can include computers running UNIX, Linux, Solaris, or Apple Mac OS X operating systems as well as mobile clients with Apple handhelds or Android or Windows Phone smart phones and tablets.
Progent can also show you how to outsource spam filtering and protection from email-borne security threats. Email Guard is Progent's email filtering and encryption solution that uses the technology of top information security companies to deliver web-based control and comprehensive security for all your inbound and outbound email. The hybrid structure of Progent's Email Guard managed service combines cloud-based filtering with an on-premises gateway device to provide complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based malware. ProSight Email Guard's cloud filter serves as a first line of defense and keeps most unwanted email from reaching your network firewall. This decreases your vulnerability to inbound threats and conserves network bandwidth and storage. ProSight Email Guard's on-premises security gateway appliance provides a further layer of inspection for inbound email. For outgoing email, the onsite gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and encryption. The onsite security gateway can also enable Exchange Server to monitor and protect internal email traffic that stays inside your corporate firewall.
Progent's security experts are available remotely or in person to offer a variety of emergency or longer-term computer security services which include:
If your business has an urgent requirement for IT security help, refer to Progent's Urgent Online Network Support.
Progent's consultants provide advanced services in vital facets of network security including analysis, firewalls and VPN, and advanced security consulting.
Progent's expert security engineers can evaluate the vulnerability of your current computer protection systems through exhaustive remote automated analysis via advanced software tools and tested techniques. Progent's experience in administering this service saves you money and assures an accurate portrayal of system vulnerability. The information your company gains can make up the foundation of a network protection plan that will allow your information system to operate dependably and react rapidly to future risks.
Automated Network Vulnerability Evaluation
Progent provides expertise in the use of security analysis products including Microsoft's MBSA and GFI LANguard NSS for economically performing a set of programmed network testing scans to uncover potential security holes. Progent has broad experience with other network auditing utilities including NMAP Port Scanner, AMAP, eEye, plus utilities like Metasploit Framework, Netcat, Hydra, and Nikto. Progent can show you how to understand audit reports and respond appropriately.
Progent can help you build security into your business processes, configure auditing applications, define and deploy a protected network architecture, and recommend procedures to maximize the safety of your IT system. Progent's security professionals are ready to assist you to set up a firewall, implement safe remote connectivity to email and business applications, and install virtual private network. Find out additional information on Progent's automated security audits.
Security Inventory Packages for Small Companies
Progent has put together two ultra-affordable security inventory packages designed to enable small companies to get an impartial security assessment from a certified security expert. With Progent's External Security Inventory Checkup, a security engineer administers a comprehensive examination of your IT infrastructure from outside your firewall to uncover potential weaknesses in the security profile you expose to the outside world. With Progent's Internal Security Inventory Scan, a security expert executes a system scan from an authorized machine within your firewall to determine your exposure to internal threats. The two security inventory packages are configured and executed from a protected external location. The process is overseen by a consultant who has earned top security credentials and who produces a report that details and interprets the data captured by the security scan and proposes practical improvements where called for.
Network Security Penetration Testing Support Services
Stealth penetration testing is an important part of any comprehensive IT system security plan. Progentís security experts can run thorough penetration checks without the knowledge of your organization's internal network support resources. Unannounced penetration testing uncovers whether existing security monitoring tools such as intrusion incident alerts and event history analysis are properly configured and actively monitored. Find out more about Progent's network security penetration analysis consulting.
Firewall and Virtual Private Network Solutions
Progent's background in security technology encompasses extensive familiarity with major firewalls and VPN technology from multiple vendors such as Cisco, Microsoft, and CheckPoint. Progent offers the services of engineers with key industry accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Integration and Troubleshooting
The new ASA 5500-X Family of firewalls with Firepower Services deliver substantially more performance than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX security appliances for all new deployments. After Cisco's acquisition of Sourcefire, the entire line of Cisco ASA 5500-X devices can be provisioned to enable Firepower Services, built on Sourcefire's Snort product, which is the world's most deployed intrusion protection system (IPS). Firepower services bring powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can assist your company to maintain your existing PIX or Cisco ASA 5500 security appliances or migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your company to plan, deploy, tune, manage and troubleshoot firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Read additional information about Cisco ASA 5500-X Firewalls with Firepower Services integration and troubleshooting services.
Cisco Security and VPN Support Services
Cisco's security and remote connection technology provide a comprehensive range of easy-to-administer security products to help safeguard your wired and wireless information system. Cisco's Virtual Private Network product family features switches, firewalls, intrusion detection systems and VPN concentrators. Progent's expert consulting staff includes experienced specialists with Cisco's CCIE and CCNP certifications who can assist your business to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that align most closely with your company goals. Read more information concerning Progent's Consulting Services for Cisco Security Solutions and Virtual Private Network Appliances.
Support Services for Other Firewall and Virtual Private Network Technology
Progent offers small and mid-size companies expert support for Intrusion Protection products and IPsec VPN technology from major firewall and Virtual Private Network security companies including Check Point Software, Juniper Networks, and Symantec. Progent can help you create a comprehensive security strategy and select appropriate technologies from a variety of suppliers to support your security goals while staying within your budget restraints.
Progent's Low-Cost Managed Services for Information Security
Progent's affordable ProSight line of outsourced network management services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates next generation behavior machine learning tools to guard endpoints as well as servers and VMs against modern malware attacks such as ransomware and email phishing, which routinely evade traditional signature-matching AV products. ProSight ASM protects on-premises and cloud-based resources and provides a unified platform to manage the complete threat lifecycle including protection, detection, mitigation, cleanup, and post-attack forensics. Key capabilities include single-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection services deliver ultra-affordable multi-layer security for physical and virtual servers, workstations, smartphones, and Exchange email. ProSight ESP utilizes adaptive security and modern behavior analysis for continuously monitoring and reacting to cyber threats from all attack vectors. ProSight ESP provides two-way firewall protection, penetration alarms, endpoint management, and web filtering via cutting-edge technologies packaged within a single agent managed from a single control. Progent's security and virtualization experts can help you to plan and configure a ProSight ESP environment that addresses your company's specific needs and that helps you achieve and demonstrate compliance with legal and industry data protection standards. Progent will help you specify and implement security policies that ProSight ESP will manage, and Progent will monitor your network and respond to alerts that call for immediate attention. Progent can also help you to set up and test a backup and disaster recovery solution like ProSight Data Protection Services (DPS) so you can get back in business rapidly from a destructive cyber attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection unified endpoint security and Exchange email filtering.
ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services from Progent offer small and medium-sized businesses an affordable end-to-end solution for reliable backup/disaster recovery (BDR). For a low monthly price, ProSight Data Protection Services automates your backup processes and allows fast restoration of critical data, apps and virtual machines that have become lost or corrupted due to hardware failures, software bugs, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images, plus Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to a local device, or to both. Progent's BDR consultants can provide advanced expertise to configure ProSight Data Protection Services to to comply with government and industry regulatory standards such as HIPAA, FINRA, PCI and Safe Harbor and, whenever necessary, can help you to recover your business-critical information. Read more about ProSight DPS Managed Backup and Recovery.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the infrastructure of top data security vendors to provide centralized management and comprehensive security for your email traffic. The powerful architecture of Progent's Email Guard combines cloud-based filtering with an on-premises gateway appliance to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne malware. The cloud filter serves as a preliminary barricade and blocks the vast majority of threats from making it to your security perimeter. This decreases your exposure to inbound attacks and conserves system bandwidth and storage space. Email Guard's on-premises security gateway device provides a further layer of analysis for inbound email. For outbound email, the onsite security gateway provides AV and anti-spam filtering, protection against data leaks, and email encryption. The local gateway can also assist Microsoft Exchange Server to track and safeguard internal email traffic that stays within your corporate firewall. For more information, visit ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and apps hosted in a secure Tier III data center on a high-performance virtual machine host configured and managed by Progent's network support professionals. Under the ProSight Virtual Hosting model, the client retains ownership of the data, the operating system platforms, and the applications. Because the environment is virtualized, it can be ported easily to a different hardware solution without requiring a lengthy and difficult configuration procedure. With ProSight Virtual Hosting, you are not locked into a single hosting provider. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, maintain, find and protect information about your network infrastructure, processes, business apps, and services. You can quickly locate passwords or IP addresses and be alerted automatically about upcoming expirations of SSLs or domains. By cleaning up and managing your network documentation, you can eliminate as much as half of time thrown away looking for critical information about your IT network. ProSight IT Asset Management features a centralized repository for storing and collaborating on all documents related to managing your network infrastructure such as recommended procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for collecting and associating IT information. Whether youíre planning improvements, performing maintenance, or responding to a crisis, ProSight IT Asset Management delivers the information you need the instant you need it. Find out more details about Progent's ProSight IT Asset Management service.
Expert Network Security Planning
Every company should develop a thoroughly thought out security strategy that incorporates both pre-attack procedures and reaction planning. The proactive plan is a set of procedures intended to minimize vulnerabilities. The post-attack plan helps your network security personnel to assess the impact caused by a security penetration, repair the system, record the experience, and get business functions restored as quickly as feasible.
Progent's expert IS security engineers can to help you to perform a comprehensive risk assessment and define a computer security plan to implement security policies and mechanisms to minimize ongoing attacks and threats.
CISM Accredited Network Security Support Assistance
The Certified Information Security Manager (CISM) committee defines the basic capabilities and worldwide standards of performance that information security professionals are required to master. CISM provides executive management the assurance that consultants who have earned their CISM certification possess the background and capability to provide effective security management and support consulting. Progent can provide the services of CISM Certified security professionals to assist businesses with:
Read additional information concerning Progent's CISM Network Security Consulting Services.
- Information Security Governance
- Vulnerability Analysis
- Network Security Implementation Management
- Information Security Management
- Response Management
CISSP Certified Security Engineering Assistance
CISSP recognizes mastery of a global standard for information security. The American National Standards Institute has awarded the CISSP credential recognition in the area of data protection stipulated by ISO 17024. Progent can provide the services of security professionals who have earned CISSP accreditation. Progent can provide a CISSP-certified professional to help your business in a variety security fields such as:
Learn additional details about Progent's CISSP-certified Cybersecurity Support Professionals.
- Security Administration Procedures
- Security Infrastructure and Paradigms
- Access Control Solutions and Methodology
- Software Development Security
- Secure Operations
- Site Security
- Encryption/Decryption Technology
- Telecommunications, Network and Internet Security
- Business Continuity Planning
CISSP-ISSAP Qualified Secure Information System Architecture Engineering Assistance
Progent's CISSP-ISSAP Certified IT architecture professionals are consultants who have been awarded ISSAP Certification through thorough testing and extensive work with network security architecture. The Information System Security Architecture Professional (ISSAP) certification indicates demonstrated skill in the most complex requirements of IS security architecture bounded by the broader scope of information system security expertise needed for CISSP certification. Progent's ISSAP-certified security specialists can help your business with all aspects of architecture security such as.
Read additional details concerning Progent's ISSAP Certified Secure Information System Architecture Support Services.
- Access Management Systems and Methodologies
- Phone System and Network Infrastructure Protection
- Encryption/Decryption Solutions
- Requirements Evaluation and Security Criteria
- BCP and Disaster Recovery Planning (DRP)
- Hardware Security
CISA Accredited Security Auditing Consulting Expertise
The CISA credential is a globally recognized achievement that signifies mastery in information system security auditing. Accredited by the American National Standards Institute, the CISA accreditation has consultants undergo a comprehensive examination given by the ISACA professional group. Progent's CISA-certified IS security audit specialists can assist your business in the areas of:
Learn more details concerning Progent's CISA Qualified Information System Security Auditing Consulting Services.
- IS Audit Process
- Information Technology Governance
- Systems and Architecture Lifecycle Planning
- IT Service Delivery
- Protecting Data Resources
- Business Continuity Planning
The CRISC program was established by ISACA to verify an IT professional's ability to design, deploy, and support information system controls to mitigate risk. Progent can provide the expertise of a CRISC-certified consultant to assist your company to develop and execute a workplace continuity or disaster recovery plan based on industry best practices promoted by CRISC and geared to match your company's risk appetite, business goals, and budgetary guidelines. Progent's CRISC-certified IT risk management specialists offer a variety of risk identification services including:
Find out more information about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Collect information and review documentation to help identify major risk scenarios
- Identify statutory, regulatory, and business mandates and company policies related to your information system to assess their possible influence on your strategic objectives
- Identify potential threats for your business processes to help in evaluating your enterprise risk
- Develop a risk awareness initiative and conduct seminars to ensure your stakeholders appreciate IS risk so they can assist with your risk management program
- Connect identified risk scenarios to related business processes to help determine risk ownership
- Determine risk tolerance with executive management and key stakeholders to make sure they are in agreement
GIAC Certified Network Security Engineering Assistance
Find out additional details about Progent's GIAC Information Assurance Services.
Global Information Assurance Certification was founded in 1999 to validate the skill of computer security engineers. GIAC's goal is to assure that an accredited security consultant has the knowledge appropriate to deliver support in vital categories of system, information, and software security. GIAC accreditations are acknowledged by businesses and institutions all over the world including and the United States National Security Agency (NSA). Progent's GIAC-qualified network security audit experts are available to assist your business in the areas of:
Contact a Certified Security Engineer
To see how to access a certified Progent security engineer for remote or onsite support in Florida, call 1-800-993-9400 or go to Online Computer Help.