Small business networks in New Mexico now have prompt and economical remote access to Progent's certified security engineers to fix the toughest security issues. Rates are reasonable, charges are per minute, sign-up is quick, and support is world class. Progent also provides assistance for long-term engagements that demand the services of senior security engineers with top industry certifications.

In case your New Mexico business is located away from larger metropolitan neighborhoods including Albuquerque, Las Cruces, Santa Fe, or Rio Rancho, support from nearby accredited security professionals could be problematic when there's an urgent situation. This could mean a loss of productivity for your company, angry customers, unproductive employees, and defocused executives. By contacting Progent, you can get in touch with a Certified security consultant ready to offer expertise whenever you have to have it to keep your network operating and restore your data.

Progent can assist you in your initiatives to protect your network with services ranging from security audits to creating a comprehensive security plan. Progent offers affordable service to assist companies of any size to design and maintain safe IT environments powered by Microsoft Windows and Cisco products and that can include computers based on UNIX or Linux operating systems plus mobile users with Apple iOS iPhones and iPads or Google Android or Windows Phone devices.

Progent can also assist you to outsource spam filtering and defense against email-borne attacks. Email Guard is Progent's email security solution that incorporates the services and infrastructure of leading data security vendors to provide web-based management and comprehensive security for your inbound and outbound email. The powerful architecture of Email Guard managed service integrates a Cloud Protection Layer with a local gateway device to provide advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The cloud filter serves as a first line of defense and blocks the vast majority of unwanted email from making it to your network firewall. This decreases your vulnerability to external threats and conserves network bandwidth and storage space. ProSight Email Guard's onsite security gateway device provides a further layer of analysis for incoming email. For outgoing email, the onsite gateway provides AV and anti-spam filtering, DLP, and encryption. The local gateway can also help Exchange Server to monitor and protect internal email traffic that originates and ends within your security perimeter.

Progent's certified professionals are accessible online or on site to offer a range of urgent or longer-term IT security services including:

  • Run extensive security audits
  • Recover quickly after virus and worm attacks
  • Set up firewalls from multiple vendors
  • Implement safe methods for remote and mobile connectivity
  • Deploy effective utilities for automatic defense against viruses, spam and directory harvest attacks
  • Help create a company-wide security strategy with proactive monitoring
  • Offer comprehensive Call Center Support
  • Help Develop an effective backup and restore strategy built around Microsoft DPM backup technology
If your company has an immediate need for computer security support, refer to Progent's Emergency Online Network Help.

Progent's engineers provide advanced services in vital facets of system protection that include analysis, firewalls and VPN, and advanced security planning.

System Assessment
Progent's certified security consultants can evaluate the effectiveness of your current computer security environment through exhaustive remote automated analysis via sophisticated software tools and proven procedures. Progent's experience in this service saves you time and money and assures a detailed portrayal of security holes. The knowledge your business gains can make up the basis of a network protection strategy that can allow your information system to run safely and adapt quickly to future threats.

Automated Network Vulnerability Audits
Progent provides consulting in the use of security evaluation software such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard NSS for economically performing a variety of automatic network auditing checks to identify possible security vulnerabilities. Progent has broad experience with additional network analysis utilities such as NMAP Port Scanner, AMAP, eEye, plus utilities such as Metasploit Framework, Netcat, and Nikto. Progent can show you how to make sense of testing reports and react effectively.

Progent can show you how to build protection into your company processes, install scanning applications, define and implement a protected system architecture, and recommend procedures to maximize the safety of your IT system. Progent's security engineers are able to assist you to set up a firewall, design safe remote connectivity to email and data, and integrate VPN. Find out more about Progent's automated security analysis.

Security Inventory Scanning Packages for Small Companies
Progent has put together two low-cost security inventory service bundles designed to allow small businesses to receive an independent security assessment from a certified security specialist. With Progent's External Network Security Inventory Scan, a security engineer runs an extensive examination of your network from beyond your company firewall to uncover possible risks in the security posture you present to the outside world. With Progent's Internal Security Inventory Checkup, a security expert executes a network scan from an authorized computer within your company firewall to uncover vulnerabilities to inside attacks. The two security inventory packages are set up and executed from a protected external location. The process is directed by an engineer who has earned top security accreditations and who produces a document that details and interprets the information captured by the security scan and proposes cost-effective remediation if appropriate.

Network Intrusion Testing Support Services
Stealth intrusion testing is a key component of any successful IT system security plan. Progentís security experts can run extensive intrusion tests without the knowledge of your company's internal network support staff. Unannounced penetration checking shows whether existing security monitoring systems such as intrusion incident warnings and event history monitoring are properly set up and consistently checked. Find out additional information on Progent's stealth security penetration testing consulting.

Firewalls and VPN Expertise
Progent's expertise in security technology encompasses in-depth familiarity with major firewalls and Virtual Private Network technology from a variety of vendors including Cisco, Microsoft, and Symantec. Progent can provide the services of consultants with important industry accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Integration and Debugging
The current ASA 5500-X Family of firewalls with Firepower Services provide significantly more bang for the buck than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX 500 firewalls for new deployments. Since Cisco's purchase of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be provisioned to enable Firepower Services, built on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system (IPS). Firepower services provide powerful new features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-premier CCIE network experts can help you to manage your current PIX or ASA 5500 firewalls or upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your business to design, integrate, optimize, manage and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Read additional details about Cisco ASA Firewalls with Firepower Services configuration and troubleshooting support.

Cisco Security and VPN Engineering Expertise
Cisco's network security and remote access technology offer a complete line of manageable security products to help safeguard your wired and wireless information system. Cisco's VPN line includes switches, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's expert staff of consultants includes experienced specialists with Cisco Certified Internetwork Expert and Cisco Certified Network Professional certifications who can help your company to select Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that fit best with your company objectives. Learn more information about Progent's Engineering Expertise for Cisco Security Technology and VPN Appliances.

Engineering Expertise for Other Firewall and Virtual Private Network Products
Progent provides small and mid-size companies professional consulting for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and VPN security vendors such as Check Point Software, Juniper Networks, and Symantec. Progent can show you how to design a comprehensive security plan and select the right technologies from a variety of suppliers to support your security objectives while staying within your spending limits.

Progent's Low-Cost Managed Services for Information Assurance
Progent's low-cost ProSight series of outsourced network management services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services available from Progent include:

ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection solution that incorporates cutting edge behavior-based analysis tools to guard endpoint devices as well as physical and virtual servers against new malware assaults such as ransomware and email phishing, which routinely escape traditional signature-matching AV tools. ProSight Active Security Monitoring protects on-premises and cloud-based resources and offers a unified platform to manage the entire threat progression including filtering, detection, mitigation, cleanup, and forensics. Key features include one-click rollback using Windows VSS and real-time system-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.

ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection (ESP) managed services deliver ultra-affordable multi-layer security for physical and virtual servers, desktops, mobile devices, and Exchange Server. ProSight ESP uses adaptive security and modern behavior analysis for round-the-clock monitoring and responding to security threats from all attack vectors. ProSight ESP delivers firewall protection, penetration alerts, device control, and web filtering via leading-edge tools packaged within a single agent managed from a single control. Progent's security and virtualization consultants can help your business to design and configure a ProSight ESP deployment that addresses your organization's unique needs and that helps you demonstrate compliance with government and industry data protection regulations. Progent will help you specify and implement policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alerts that require immediate attention. Progent's consultants can also assist your company to install and test a backup and restore solution such as ProSight Data Protection Services (DPS) so you can get back in business rapidly from a destructive security attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Exchange filtering.

ProSight DPS: Managed Backup
ProSight Data Protection Services offer small and medium-sized organizations a low cost and fully managed service for secure backup/disaster recovery. For a low monthly price, ProSight Data Protection Services automates your backup activities and enables rapid recovery of vital data, applications and VMs that have become unavailable or corrupted as a result of hardware failures, software glitches, disasters, human error, or malicious attacks like ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to an on-promises storage device, or to both. Progent's cloud backup consultants can provide world-class support to set up ProSight DPS to be compliant with regulatory requirements like HIPPA, FINRA, PCI and Safe Harbor and, whenever needed, can help you to restore your critical information. Read more about ProSight Data Protection Services Managed Backup and Recovery.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the infrastructure of top information security companies to provide web-based management and world-class security for your inbound and outbound email. The hybrid architecture of Progent's Email Guard combines cloud-based filtering with a local security gateway device to provide complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. Email Guard's cloud filter serves as a first line of defense and keeps the vast majority of unwanted email from making it to your security perimeter. This decreases your exposure to inbound attacks and conserves network bandwidth and storage. Email Guard's onsite gateway device provides a deeper layer of analysis for incoming email. For outgoing email, the local security gateway offers anti-virus and anti-spam filtering, DLP, and email encryption. The local security gateway can also assist Microsoft Exchange Server to track and safeguard internal email that stays within your security perimeter. For more information, see Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and applications hosted in a secure fault tolerant data center on a fast virtual machine host set up and managed by Progent's network support experts. With Progent's ProSight Virtual Hosting service model, the client owns the data, the operating system software, and the apps. Since the environment is virtualized, it can be moved easily to a different hardware solution without a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, your business is not locked into a single hosting service. Find out more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, update, retrieve and protect data related to your network infrastructure, procedures, business apps, and services. You can quickly find passwords or IP addresses and be warned automatically about impending expirations of SSL certificates ,domains or warranties. By cleaning up and managing your network documentation, you can save as much as half of time thrown away looking for vital information about your IT network. ProSight IT Asset Management features a common repository for storing and sharing all documents required for managing your network infrastructure like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers a high level of automation for collecting and relating IT data. Whether youíre planning improvements, performing regular maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the information you need as soon as you need it. Find out more about ProSight IT Asset Management service.

Expert Network Security Design
Every business should develop a thoroughly thought out security strategy that includes both proactive procedures and reaction plans. The pre-attack plan is a collection of mechanisms that help to minimize vulnerabilities. The post-attack strategy helps your company's IT security engineers to evaluate the impact caused by a security penetration, fix the network, document the event, and get business functions restored as rapidly as feasible.

Progent's certified information security consultants are available to assist you to run a comprehensive vulnerability assessment and define a network security strategy to establish security policies and mechanisms to reduce future assaults and dangers.

CISM Accredited Information Security Support Assistance
The CISM committee describes the core competencies and global standards of performance that IT security professionals are required to learn. It provides business management the assurance that consultants who have qualified for their CISM certification have the experience and knowledge to deliver effective security administration and consulting consulting. Progent can provide the services of CISM Certified security professionals to help companies with:

  • IS Security Governance
  • Risk Management
  • Network Security Program Management
  • Information Security Management
  • Response Management
Learn additional information about Progent's CISM Accredited Information Security Consulting Expertise.

CISSP Accredited Security Consulting Support
CISSP certification denotes mastery of a worldwide standard for data security. ANSI has granted certification recognition in the field of data security stipulated by ISO/IEC 17024. Progent offers access to of security experts who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified expert to help your organization in a broad range of security fields including:

  • Security Administration Procedures
  • Security Architecture and Paradigms
  • Access Control Systems and Methodology
  • Applications Development Security
  • Operations Security
  • Site Security
  • Cryptography Technology
  • Telecom, LAN and Internet Security
  • Disaster Recovery Planning
Learn additional details concerning Progent's CISSP-certified Information Security Consulting Professionals.

CISSP-ISSAP Certified Secure Network Architecture Consulting Assistance
Progent's CISSP-ISSAP Certified IT architecture engineers are consultants who have been awarded ISSAP Certification through rigorous examination and significant work with information security architecture. The ISSAP credential indicates proven competence in the most complex demands of information security architecture bounded by the wider scope of IS security expertise required for CISSP accreditation. Progent's ISSAP-certified security experts can help your company with all aspects of architecture security such as.

  • Access Management Mechanisms and Techniques
  • Telecom and Network Infrastructure Protection
  • Cryptography Solutions
  • Requirements Evaluation and Security Guidelines
  • BCP and DRP
  • Site Security
Find out additional information about Progent's ISSAP Accredited Secure System Architecture Consulting Professionals.

CISA Certified Information System Security Auditing Consulting Expertise
The Certified Information Systems Auditor accreditation is a recognized qualification that represents expertise in information system security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA credential requires that candidates pass a comprehensive examination given by the ISACA international professional group. Progent's CISA-certified security audit specialists can assist your company in the areas of:

  • Information Systems Audit Services
  • IT Governance
  • Network Assets and Architecture Lifecycle Planning
  • IT Support
  • Protecting Data Resources
  • Business Continuity Planning
Learn the details concerning Progent's CISA Qualified Security Auditing Consulting Support.

CRISC Experts
The CRISC program was established by ISACA to verify a consultant's skills to design, deploy, and support information system controls to reduce risk. Progent can provide the services of a CRISC-certified consultant to assist you to develop and carry out a workplace continuity strategy based on industry best practices identified by CRISC and crafted to align with your organization's risk tolerance, business goals, and IT budget. Progent's CRISC-qualified network risk mitigation specialists offer a variety of risk assessment services such as:

  • Collect data and study documentation to help identify major risk scenarios
  • Inventory statutory, regulatory, and business mandates and company policies related to your information system to assess their possible influence on your strategic goals
  • Identify possible vulnerabilities for your business processes to assist in evaluating your enterprise risk
  • Create a risk awareness program and provide training to make sure your organization appreciate IT risk so they can contribute to your risk control program
  • Connect key risk vectors to your associated operational processes to help determine risk responsibility
  • Validate risk appetite with your senior management and key stakeholders to make sure they are in agreement
Find out additional information concerning Progent's CRISC Risk Management Experts.

GIAC Qualified Security Engineering Support
GIAC was established in 1999 to certify the skill of computer security experts. GIAC's goal is to assure that a certified professional has the knowledge needed to deliver services in critical categories of system, data, and program security. GIAC certifications are recognized by companies and institutions all over the world including and the United States NSA. Progent's GIAC IS security audit experts are available to help your company with:

  • Auditing Networks
  • Incident Handling
  • Traffic Analysis
  • Web-based Services Security
  • SIEM solutions
Find out more details about Progent's GIAC Information Assurance Expertise.

Talk to a Progent Security Expert
To see how to get in touch with a security consultant for online or on-premises expertise in New Mexico, phone 1-800-993-9400 or go to Online Network Help.