Small business IT networks in New Mexico can now get prompt and economical online help from Progent's qualified network security experts to fix urgent security problems. The cost is competitive, billing is by the minute, sign-up is fast, and service is unbeatable. Progent also provides assistance for complex projects that demand the services of senior security engineers with high-level industry certifications.

If your New Mexico business is situated away from larger metropolitan neighborhoods such as Albuquerque, Las Cruces, Santa Fe, or Rio Rancho, the availability of local qualified security consultants may be limited when you have a security disaster. This can cause a loss of revenue for your business, upset customers, unproductive employees, and distracted executives. By contacting Progent's remote support, you have access to a Premier security engineer who can offer expertise when you require it to get your information system running and recover your data.

Progent can assist you at any level in your efforts to protect your information system with services that ranges from security checks to creating a company-wide security strategy. Progent offers affordable service to assist companies of any size to design and maintain secure networks based on Microsoft Windows and Cisco technology and that can include computers based on UNIX or Linux operating systems plus mobile users with Apple iPhones and iPads or Android or Windows Phone handsets.

Progent can also show you how to outsource spam filtering and defense against email-borne attacks. Email Guard is Progent's email filtering and encryption solution that incorporates the services and infrastructure of top information security vendors to deliver web-based control and world-class protection for all your email traffic. The powerful architecture of Progent's Email Guard managed service combines cloud-based filtering with a local gateway appliance to offer advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The cloud filter acts as a first line of defense and blocks most threats from making it to your network firewall. This reduces your vulnerability to external threats and conserves system bandwidth and storage. ProSight Email Guard's on-premises gateway appliance adds a deeper level of analysis for inbound email. For outgoing email, the local security gateway offers AV and anti-spam filtering, protection against data leaks, and email encryption. The onsite security gateway can also enable Microsoft Exchange Server to monitor and protect internal email traffic that originates and ends inside your corporate firewall.

Progent's security professionals are accessible remotely or in person to offer a variety of emergency or project-based computer security services which include:

If your network has an emergency requirement for IT security help, refer to Progent's Urgent Remote Network Help.

Progent's support professionals can deliver advanced support in key fields of network security that include analysis, firewall and VPN expertise, and high-level security planning.

Security Evaluation
Progent's expert security consultants can evaluate the strength of your current network security implementation through exhaustive remote automated analysis via advanced utilities and proven procedures. Progent's skill in administering this service saves your company consulting fees and assures an accurate portrayal of weaknesses. The knowledge your IT organization gains can be used as the basis of a security strategy that will allow your network to run dependably and adapt rapidly to new threats.

Automated Vulnerability Audits
Progent offers expertise in the application of security testing software including Microsoft Baseline Security Analyzer (MBSA) and LANguard from GFI for affordably running a set of automatic system testing checks to uncover potential security gaps. Progent has extensive knowledge of additional security auditing products such as NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, as well as tools like Metasploit, Netcat, Socat, and Nikto. Progent can help you to make sense of testing reports and react appropriately.

Progent can help you build protection into your business operations, install scanning tools, plan and deploy a protected system architecture, and suggest policies to maximize the safety of your network. Progent's security engineers are ready to show you how to configure a firewall, design safe remote access to email and business applications, and install virtual private network. Learn additional information on Progent's automated security audits.

Security Inventory and Evaluation Packages for Small Companies
Progent offers two low-cost security inventory scanning bundles intended to allow small companies to get an independent security assessment from a qualified security specialist. With Progent's External Network Security Inventory Scan, a security engineer administers an extensive examination of your network from outside your firewalled perimeter to uncover potential weaknesses in the security profile you present to the outside world. With Progent's Internal Network Security Inventory Scan, a certified security professional runs a network scan from an authorized machine inside your company firewall to determine the risk to internal assaults. The two security inventory packages are set up and run from a secured external location. The project is managed by a consultant with top security accreditations and who generates a document that details and interprets the information collected by the security scan and proposes cost-effective improvements where appropriate.

Stealth Security Penetration Testing Consulting
Stealth intrusion testing is an important component of any comprehensive IT system security plan. Progentís security professionals can run thorough intrusion tests without the awareness of your organization's in-house network support staff. Stealth penetration checking shows whether existing security defense systems such as intrusion incident warnings and event log monitoring are properly configured and actively monitored. Find out more on Progent's network penetration testing support services.

Firewalls and VPN Expertise
Progent's expertise in network security solutions encompasses extensive familiarity with leading firewalls and VPN technology offered by multiple vendors such as Cisco, Microsoft, and Juniper. Progent offers the services of consultants with important networking certifications including CCIE and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Configuration and Troubleshooting
The latest generation of Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver significantly more bang for the buck than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new installations. After Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system. Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help your company to manage your existing PIX or Cisco ASA 5500 security appliances and migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite help with ASA 5500-X firewalls with Firepower Services and can assist you to design, configure, optimize, manage and troubleshoot firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Find out additional details about Cisco ASA Firewalls with Firepower configuration and troubleshooting support.

Cisco Security and Virtual Private Network Support Services
Cisco's network security and remote connection technology represent a complete line of easy-to-administer security products to help safeguard your local and remote information system. Cisco's Virtual Private Network line includes switches, firewalls, intrusion detection devices and VPN appliances. Progent's expert consulting staff includes field-proven engineers with Cisco's CCIE and CCNP qualifications who can help your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that fit most closely with your business goals. Find out more details about Progent's Support Expertise for Cisco Security and VPN Appliances.

Consulting Expertise for Other Firewall and Virtual Private Network Technology
Progent offers small and medium size organizations expert support for Intrusion Protection Systems and IPsec VPN technology from leading firewall and VPN security vendors including Check Point Software, Juniper Networks, and SonicWALL. Progent can help you create a detailed security plan and select the right products from multiple suppliers to achieve your security goals while staying within your budget limits.

Progent's Flat-rate Managed Services for Information Security
Progent's affordable ProSight line of network management outsourcing services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. Managed services available from Progent include:

ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes cutting edge behavior analysis tools to defend endpoint devices and servers and VMs against new malware assaults like ransomware and email phishing, which routinely evade legacy signature-matching anti-virus products. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and offers a single platform to manage the entire malware attack progression including protection, infiltration detection, mitigation, remediation, and post-attack forensics. Top features include single-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.

ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection managed services offer ultra-affordable in-depth security for physical and virtual servers, desktops, mobile devices, and Exchange email. ProSight ESP utilizes adaptive security and advanced heuristics for continuously monitoring and responding to security threats from all vectors. ProSight ESP delivers firewall protection, intrusion alerts, device management, and web filtering through cutting-edge technologies incorporated within one agent accessible from a single console. Progent's security and virtualization consultants can help your business to plan and implement a ProSight ESP deployment that meets your organization's specific needs and that allows you prove compliance with government and industry information security standards. Progent will help you specify and configure security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alerts that require immediate action. Progent can also help you to set up and test a backup and disaster recovery system such as ProSight Data Protection Services so you can recover quickly from a potentially disastrous security attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange email filtering.

ProSight DPS: Managed Backup
ProSight Data Protection Services provide small and mid-sized organizations an affordable and fully managed solution for reliable backup/disaster recovery. Available at a fixed monthly rate, ProSight DPS automates and monitors your backup activities and allows rapid recovery of critical files, apps and VMs that have become unavailable or corrupted due to component breakdowns, software bugs, natural disasters, human mistakes, or malware attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware images/. Critical data can be protected on the cloud, to a local device, or mirrored to both. Progent's BDR specialists can provide world-class support to configure ProSight Data Protection Services to to comply with regulatory requirements such as HIPPA, FINRA, and PCI and, whenever needed, can assist you to restore your business-critical data. Read more about ProSight Data Protection Services Managed Cloud Backup.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the technology of leading data security companies to deliver web-based control and comprehensive security for all your inbound and outbound email. The hybrid architecture of Progent's Email Guard integrates a Cloud Protection Layer with a local security gateway device to offer complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based threats. The Cloud Protection Layer serves as a first line of defense and blocks the vast majority of unwanted email from making it to your security perimeter. This decreases your vulnerability to inbound attacks and saves system bandwidth and storage space. Email Guard's onsite security gateway appliance adds a further layer of inspection for incoming email. For outgoing email, the on-premises security gateway provides AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also assist Exchange Server to track and protect internal email that stays within your security perimeter. For more details, visit ProSight Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its critical servers and apps hosted in a secure Tier III data center on a high-performance virtual host configured and maintained by Progent's network support professionals. Under Progent's ProSight Virtual Hosting model, the client retains ownership of the data, the OS software, and the apps. Since the system is virtualized, it can be moved immediately to a different hardware environment without requiring a time-consuming and technically risky reinstallation procedure. With ProSight Virtual Hosting, you are not tied a single hosting provider. Find out more about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, find and protect information about your IT infrastructure, procedures, business apps, and services. You can instantly locate passwords or IP addresses and be warned automatically about impending expirations of SSLs ,domains or warranties. By updating and organizing your IT documentation, you can save up to 50% of time wasted trying to find critical information about your IT network. ProSight IT Asset Management includes a centralized repository for storing and collaborating on all documents required for managing your business network such as recommended procedures and self-service instructions. ProSight IT Asset Management also supports a high level of automation for collecting and associating IT data. Whether youíre planning improvements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the data you require the instant you need it. Find out more about Progent's ProSight IT Asset Management service.

Expert Security Consulting
Any company should develop a thoroughly considered security program that incorporates both proactive procedures and reaction plans. The pre-attack plan is a collection of mechanisms intended to minimize security weaknesses. The reactive plan helps your company's security engineers to evaluate the impact caused by a security penetration, repair the damage, document the experience, and get business functions restored as soon as feasible.

Progent's expert IT security consultants can to help your company to run a complete vulnerability assessment and define a computer security plan to establish security policies and controls to minimize future assaults and dangers.

CISM Accredited Security Engineering Assistance
The CISM committee describes the basic competencies and global standards of skill that information security managers are expected to learn. CISM provides executive management the confidence that consultants who have earned their CISM certification possess the experience and knowledge to deliver efficient security management and consulting consulting. Progent can provide the services of CISM Premier security professionals to help businesses with:

  • Information Security Processes
  • Risk Management
  • Network Security Implementation Management
  • Information Security Management
  • Recovery Management
Read more details about Progent's CISM Certified Security Support Professionals.

CISSP Accredited Security Consulting Expertise
The CISSP credential recognizes expertise with a worldwide standard for data security. ANSI has awarded the CISSP credential accreditation in the area of data security stipulated by ISO 17024. Progent can provide the services of security consultants who have qualified for CISSP certification. Progent can provide a CISSP-certified consultant to help your company in a broad range of security fields including:

  • Security Management Practices
  • Security Infrastructure and Models
  • Access Management Solutions and Processes
  • Software Development Security
  • Operations Security
  • Site Security
  • Data Encryption Technology
  • Telecommunications, Network and WAN Security
  • Disaster Recovery Preparedness
Find out more details about Progent's CISSP Information Security Consulting Professionals.

CISSP-ISSAP Certified Secure IT Architecture Engineering Assistance
Progent's CISSP-ISSAP Premier network architecture engineers are consultants who have earned ISSAP status through rigorous testing and significant work with network security design. The Information System Security Architecture Professional (ISSAP) certification represents demonstrated skill in the more challenging requirements of information system security architecture within the wider scope of information system security knowledge required for CISSP certification. Progent's ISSAP-certified security experts can assist your business with all phases of secure network architecture including.

  • Access Management Mechanisms and Methodologies
  • Phone System and Network Infrastructure Security
  • Encryption/Decryption Options
  • Needs Evaluation and Security Criteria
  • Business Continuity Planning and DRP
  • Hardware Security
Read more information concerning Progent's ISSAP Certified Secure Information System Architecture Engineering Professionals.

CISA Qualified Security Auditing Consulting Expertise
The Certified Information Systems Auditor accreditation is a recognized qualification that signifies expertise in information system security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA accreditation requires that consultants pass a comprehensive test administered by the ISACA international professional group. Progent's CISA information security audit specialists are available to help your IT organization with:

  • Information Systems Audit Services
  • IT Governance
  • Network Assets and Infrastructure Lifecycle
  • Information Technology Support
  • Protecting Information Resources
  • Disaster Recovery Preparedness
Learn additional details about Progent's CISA Qualified IS Security Auditing Consulting Assistance.

Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC program was established by ISACA in 2010 to validate an IT professional's skills to design, deploy, and maintain IS controls to reduce network risk. Progent can provide the expertise of a CRISC-certified engineer to help you to create and carry out a workplace continuity strategy based on leading practices promoted by CRISC and geared to match your company's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC IT risk management consultants can provide a range of risk evaluation services such as:

  • Gather information and study documentation to evaluate significant vulnerabilities
  • Identify statutory, industry, and contractual mandates and company policies related to your information system to determine their potential impact on your strategic objectives
  • Point out potential threats for your operational workflows to assist in evaluating your enterprise risk
  • Develop a risk awareness initiative and provide training to make sure your stakeholders appreciate information system risk so they can contribute to your risk control process
  • Match identified risk scenarios to your associated business processes to help assign risk responsibility
  • Determine risk appetite with your senior management and key stakeholders to make sure they match
Read the details about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Accredited Network Security Consulting Services
GIAC was founded in 1999 to certify the skill of IT security experts. GIAC's mission is to assure that an accredited professional possesses the knowledge necessary to deliver support in key areas of network, information, and application software security. GIAC accreditations are acknowledged by businesses and institutions throughout the world including and the U.S. National Security Agency. Progent's GIAC security audit experts can assist your company in the areas of:

  • Assessing Security Systems
  • Security Incident Response
  • Intrusion Detection
  • Web Services Security
  • SIEM solutions
Read more information concerning Progent's GIAC Information Assurance Expertise.

Get in Touch with a Progent Security Expert
To see how you can get in touch with a security engineer for remote or onsite help in New Mexico, phone 1-800-993-9400 or visit Remote Network Support.