Greater Dallas Metro Area Contact Information:
Progent offers consulting services and onsite technical support throughout the Greater Dallas Metro Area.
Progent locations in the Greater Dallas Metro Area
||5080 Spectrum Drive
Addison, Texas, 75001
|Sales Phone: 469-317-9411
Link: Addison, TX Network Support Services
||1333 W McDermott Dr
Allen, Texas, 75013
|Sales Phone: 469-342-0443
Link: Allen, TX Network Support Services
||3710 Rawlins St
Dallas, Texas, 75219
|Sales Phone: 214-446-3777
Link: Dallas, TX Network Support Services
|Fort Worth, TX
||420 Throckmorton Street
Fort Worth, Texas, 76102
|Sales Phone: 682-499-9550
Link: Fort Worth, TX Network Support Services
||5000 Riverside Dr
Suite 100 Bldg 6
Irving, Texas, 75039
|Sales Phone: 469-565-9652
Link: Irving, TX Network Support Services
||5700 Granite Pkwy
Plano, Texas, 75024
|Sales Phone: 469-929-2939
Link: Plano, TX Network Support Services
||550 Reserve Street
Suite 190 & 250
Southlake, Texas, 76092
|Sales Phone: 817-756-6968
Link: Southlake, TX Network Support Services
For immediate online help with computer security problems, companies in Irving, TX, can find expert expertise by contacting Progent's security professionals. Progent's remote service consultants are ready to provide effective and affordable assistance with security issues that threaten the productivity of your IT network. Progent's security consultants are qualified to support environments powered by Windows, Linux, Apple macOS and OS X, Solaris, and popular versions of UNIX. Progent's broad array of consulting services covers firewall expertise, email security, protected network design, and disaster recovery planning. Progent's support team has been awarded the industry's most advanced security certifications including GIAC and Certified Information Systems Security Professional (CISSP).
Progent provides online security support on a by-the-minute model without minimum call duration and no extra charges for setup or off-hour service. By billing per minute and by providing top-level expertise, Progent's pricing model keeps expenses low and avoids situations where quick solutions turn into major charges.
Our Network Has Been Attacked: What Can We Do?
In case your network is currently faced with a security emergency, visit Progent's Emergency Online Computer Help to see how to receive immediate assistance. Progent maintains a team of certified network security experts who offer online and on-premises support that includes threat containment, mitigation, restoration, forensics, and hardening of your cybersecurity defense to protect against future attacks.
For organizations that have planned carefully for a security breech, the step-by-step incident handling procedure promoted by GIAC (Global Information Assurance Certification) is Progent's recommended method of handling a serious security penetration.
Introduction to Security Services
Coordinating network protection as well as preparation for recovering critical data and functions after an attack requires a continual process that entails an array of technologies and processes. Progent's certified experts can help your organization at all levels in your efforts to secure your information system, ranging from security evaluation to designing a complete security plan. Some areas supported by Progent's experts include Planning and Implementation, Information Recovery and Security Failure Analysis, and Outsourced Protection from Email-Based Spam and Viruses.
Planning and Building Secure Environments
Every company ought to develop a thoroughly considered security strategy that includes both proactive and reactive activity. The proactive plan is a collection of steps that helps to minimize vulnerabilities. The post-attack plan defines activities to assist security personnel to assess the losses caused by a breach, repair the damage, document the experience, and revive business functions as soon as feasible. Progent can show you how to incorporate security into your business operations. Progent can install scanning utilities, create and execute a secure computer infrastructure, and propose processes and policies to maximize the protection of your information system. Progent's security professionals are ready to help you to configure a firewall, deploy protected offsite connectivity to email and information, and configure an effective virtual private network (VPN).
If you are looking for an economical option for outsourcing your network security administration, Progent's 24x7 Monitoring Services include automated remote system tracking and immediate response to emergencies.
Hybrid Cloud Solutions
Progent can help your IT team you to design, implement, manage and repair enterprise hybrid cloud solutions that include physical and cloud resources and that are compliant with regulatory data security standards. (Find out about Progent's Office 365 integration solutions with on-premises installations of Exchange, Microsoft Azure enterprise hybrid cloud integration and Progent's Amazon Web Services enterprise hybrid cloud solutions.)
System Restoration and Security Forensics
Progent has expertise in recovering networks and devices that have been compromised, are quarantined, or have ceased to function because of a security penetration. Progent can help assess the losses caused by the breach, restore normal business operations, and recover information lost owing to the breach. Progent's security specialists can also perform a thorough failure evaluation by going over event logs and utilizing other advanced assessment tools. Progent's experience with security consulting minimizes your business disruption and permits Progent to recommend effective measures to prevent or contain future attacks.
Progent's Flat-rate Managed Services for Information Security
Progent's value-priced ProSight line of managed services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection solution that incorporates cutting edge behavior machine learning tools to guard endpoint devices as well as servers and VMs against modern malware assaults such as ransomware and file-less exploits, which easily escape legacy signature-matching anti-virus products. ProSight ASM safeguards on-premises and cloud-based resources and provides a single platform to address the complete threat lifecycle including filtering, identification, containment, cleanup, and forensics. Top features include one-click rollback using Windows Volume Shadow Copy Service and automatic network-wide immunization against newly discovered attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection (ESP) managed services offer affordable multi-layer protection for physical servers and VMs, workstations, smartphones, and Exchange Server. ProSight ESP uses adaptive security and advanced heuristics for round-the-clock monitoring and responding to security assaults from all attack vectors. ProSight ESP offers firewall protection, intrusion alerts, endpoint management, and web filtering through cutting-edge tools packaged within one agent managed from a unified console. Progent's data protection and virtualization consultants can assist you to design and implement a ProSight ESP environment that meets your organization's unique needs and that helps you prove compliance with government and industry data security standards. Progent will help you specify and implement security policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alerts that require urgent attention. Progent's consultants can also assist you to install and verify a backup and restore solution like ProSight Data Protection Services (DPS) so you can recover quickly from a destructive security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Exchange email filtering.
ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services provide small and mid-sized organizations an affordable end-to-end solution for secure backup/disaster recovery. Available at a fixed monthly price, ProSight Data Protection Services automates and monitors your backup processes and enables rapid restoration of vital data, apps and VMs that have become unavailable or damaged as a result of component breakdowns, software bugs, natural disasters, human error, or malware attacks like ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, applications, system images/, plus Hyper-V and VMware virtual machine images/. Critical data can be protected on the cloud, to a local storage device, or mirrored to both. Progent's backup and recovery consultants can provide world-class expertise to configure ProSight Data Protection Services to to comply with government and industry regulatory requirements such as HIPPA, FINRA, and PCI and, when needed, can help you to recover your business-critical data. Read more about ProSight DPS Managed Cloud Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that uses the infrastructure of leading data security vendors to deliver web-based management and comprehensive security for your email traffic. The powerful structure of Email Guard managed service integrates cloud-based filtering with a local gateway device to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based threats. The cloud filter serves as a first line of defense and blocks the vast majority of threats from reaching your network firewall. This decreases your vulnerability to inbound threats and conserves network bandwidth and storage. Email Guard's on-premises security gateway appliance provides a further layer of analysis for incoming email. For outbound email, the on-premises gateway offers AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also help Exchange Server to monitor and protect internal email that stays within your security perimeter. For more information, visit ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small organization can have its critical servers and applications hosted in a protected Tier III data center on a high-performance virtual machine host configured and maintained by Progent's network support experts. Under the ProSight Virtual Hosting service model, the client retains ownership of the data, the operating system platforms, and the apps. Since the environment is virtualized, it can be moved immediately to a different hardware solution without a time-consuming and technically risky configuration process. With ProSight Virtual Hosting, your business is not tied a single hosting service. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, update, find and protect information about your network infrastructure, procedures, applications, and services. You can instantly find passwords or serial numbers and be warned automatically about upcoming expirations of SSLs or domains. By updating and organizing your IT infrastructure documentation, you can save as much as half of time wasted looking for vital information about your IT network. ProSight IT Asset Management features a centralized location for storing and sharing all documents required for managing your network infrastructure like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers a high level of automation for collecting and relating IT information. Whether you’re planning improvements, doing maintenance, or responding to a crisis, ProSight IT Asset Management gets you the information you require the instant you need it. Learn more about Progent's ProSight IT Asset Management service.
Specialized Security Services Offered by Progent
Progent's veteran engineers offer unique expertise in key areas of computer protection including:
Vulnerability Audits and Compliance Assessment
Progent provides experience with security auditing utilities such as Microsoft Baseline Security Analyzer and LANguard for conducting a variety of comprehensive system scans to reveal potential security problems. Progent has broad skills with testing tools and can assist your company to understand assessment reports and react efficiently. Progent's security consultants also can perform web software validation and can conduct expert evaluation of enterprise-wide security to assess your organization's compliance with major global security specifications including HIPAA, PCI, and ISO. In addition, Progent can assess the strength of your wireless security including in-place wireless appliances as well as mobile handsets. Find out additional details concerning Progent's Vulnerability Audits and Compliance Assessment.
Cisco Security, PIX Firewall and ASA Firewall, VPN, Aironet and Meraki Wi-Fi Help
Progent's Cisco CCIE engineers and Cisco CCNP experts can provide world-class technical support for Cisco's complete range of security and Virtual Private Network products including PIX Series Firewalls and ASA 5500 Series Firewalls, the Catalyst FWSM, protected broadband and integrated services routers, Aironet wireless access points, Meraki cloud-managed Wi-Fi APs, and Catalyst family switches. Learn additional information about Cisco Protection, Virtual Private Network and Aironet Wireless Help.
Other Firewall and Virtual Private Network (VPN) Solutions
Stealth Intrusion Testing Services
In addition to supporting a broad range of security technologies from Microsoft and Cisco, Progent offers businesses of all sizes advanced consulting for security products from other major firewall and Virtual Private Network (VPN) suppliers. Progent's consultants can provide:
Unannounced intrusion checking is a vital technique for allowing organizations to determine how vulnerable their information systems are to real-world threats by revealing how effectively network security processes and technologies hold up against authorized but unannounced penetration efforts instigated by veteran security engineers using the latest hacking techniques. Learn more details about Progent's Penetration Testing Services.
Certified Information Security Manager Security Consulting Expertise
CISM defines the basic competencies and worldwide benchmarks of service that information security managers are expected to achieve. CISM offers business management the assurance that consultants who have been awarded their CISM have the background and knowledge to offer effective security administration and engineering services. Progent can provide a CISM-certified support professional to assist your organization in key security disciplines including data security governance, vulnerability management, data security process control, and crisis response support.
Find out additional information concerning Progent's CISM Security Consulting Expertise.
Certified Information Systems Security Professionals (CISSP) Security Consulting Services
Progent's Certified Information Systems Security Professionals (CISSPs) are cybersecurity engineers who have earned CISSP status through verified professional work, rigorous study, and formal examination. CISSP Certification recognizes expertise in an international standard for information security. ANSI has given the CISSP credential accreditation in the area of information security under ISO/IEC 17024. Areas of knowledge covered within CISSP include cybersecurity management practices, security architecture and models, access permission methodology, applications development security, operations security, physical security, cryptography, communications, Internet security, and business continuity planning.
Read the details about Progent's Certified Information Systems Security Professionals (CISSP) Consulting Expertise.
CISSP-ISSAP Certified Consultants for Secure Network Infrastructure
Progent's ISSAP certified cybersecurity experts have earned ISSAP status following rigorous examination and extensive experience. field experience with information security architecture. ISSAP security experts possess comprehensive understanding of access management systems and techniques, phone system and network infrastructure protection, cryptography, requirements analysis, business continuity and disaster recovery planning (DRP), and physical security integration. Progent's ISSAP-qualified security experts can help your business with all aspects of secure network architecture.
Read more information concerning Progent's ISSAP Accredited Secure IT Architecture Consulting Support.
CISSP-ISSEP Qualified Security Engineering Experts
Cybersecurity consultants who have earned CISSP-ISSEP (Information Systems Security Engineering Professional) certification have shown their ability to provide large organizations with the expertise associated with a senior systems engineer, information assurance systems engineer, information assurance officer, information assurance analyst, or senior security analyst. Progent offers the support of a certified CISSP-ISSEP network security expert to assist your enterprise to utilize modern system security engineering principles and processes in system development, review and evaluate system security designs based on cybersecurity engineering best practices, produce cohesive system designs that incorporate compliant cybersecurity mechanisms for all critical system functions, develop efficient configuration strategies to provide protection for operations, perform in-depth risk analysis, and propose realistic cybersecurity solutions that balance your operational requirements with your company's tolerance for risk.
Learn the details about Progent's CISSP-ISSEP Cybersecurity Engineering Consulting Services.
Certified Information Systems Auditor Consulting Services
The Certified Information Systems Auditor (CISA) accreditation is a prestigious achievement that represents mastery in network security auditing. Accredited by the American National Standards Institute (ANSI), the CISA credential requires that consultants pass an extensive examination administered by the ISACA professional association. Progent offers the expertise of a CISA-qualified security professional trained to help businesses in the areas of IS audit process, IT governance, network assets and architecture lifecycle, information technology service delivery, protecting data resources, and business continuity preparedness.
Read additional details about Progent's CISA Consulting Expertise.
CRISC Network Risk Management Consultants
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to validate a consultant's ability to plan, deploy, and maintain information system control mechanisms to reduce network risk. Progent can provide the expertise of a CRISC-certified consultant to help you to develop and execute a workplace continuity or disaster recovery plan that follows leading practices identified by CRISC and crafted to align with your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's network risk management services are complementary to the services provided by Progent's CISA-certified consultants for objectively auditing your IS management design and with the services of Progent's CISM-certified consultants for defining company-wide security policies.
Find out the details about Progent's CRISC Network Risk Mitigation Consulting.
GIAC Professional Expertise
GIAC (Global Information Assurance Certification) was established in 1999 to validate the skill of computer security professionals. GIAC's mission is to make sure that a certified professional has the skills necessary to provide support in vital areas of system, information, and application software security. GIAC certifications are recognized by companies and institutions around the world including United States National Security Agency. Progent can provide the support of GIAC certified security engineers for all of the security services covered within GIAC certification programs such as auditing security systems, security incident handling, traffic analysis, web-based services security, and security information and event management (SIEM) solutions.
Find out more information about Progent's GIAC Information Assurance Expertise.
Contact Progent for Computer Security Expertise
If your organization is situated in Irving or anywhere in Texas and you're trying to find cybersecurity help, call Progent at 800-993-9400 or see Contact Progent.