Business IT networks in Oklahoma now have prompt and economical online help from Progent's accredited security experts to resolve the toughest security problems. Rates are reasonable, charges are by the minute, sign-up is quick, and support is world class. Progent also offers assistance for complex projects that requires the expertise of senior security consultants with high-level security credentials.
In case your Oklahoma company is situated away from larger metropolitan areas including Oklahoma City, Tulsa, Norman, or Lawton, access to local qualified security professionals may be limited when you have a crisis. This can cause a drop in productivity for your company, upset clients, idle workers, and defocused executives. By contacting Progent's online services, you have access to a Premier security engineer who can deliver expertise when you have to have it to get your information system operating and salvage your information.
Progent can help you in your efforts to protect your network with services that can range from network security checks to developing a comprehensive security strategy. Progent offers economical support to help companies of any size to set up and maintain secure IT environments powered by Microsoft Windows and Cisco technology and that can include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X platforms as well as BYOD clients with Apple iOS iPhones and iPads or Google Android or Windows Phone devices.
Progent can also assist you to outsource spam filtering and protection from email-borne assaults. Email Guard is Progent's email security solution that incorporates the technology of leading information security companies to provide centralized management and comprehensive security for your email traffic. The powerful structure of Progent's Email Guard managed service integrates cloud-based filtering with an on-premises gateway appliance to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The cloud filter acts as a first line of defense and blocks most threats from making it to your network firewall. This decreases your vulnerability to external attacks and conserves system bandwidth and storage. ProSight Email Guard's on-premises security gateway appliance adds a further level of inspection for inbound email. For outbound email, the on-premises gateway offers AV and anti-spam filtering, protection against data leaks, and email encryption. The on-premises gateway can also enable Microsoft Exchange Server to track and safeguard internal email traffic that stays within your security perimeter.
Progent's security professionals are accessible remotely or in person to provide a range of urgent or longer-term computer security services which include:
If your company has an immediate need for computer security help, refer to Progent's Emergency Remote Network Help.
Progent's engineers offer world-class services in vital fields of network protection that include auditing, firewalls and VPN, and advanced security planning.
Progent's certified security consultants can evaluate the effectiveness of your current computer protection systems by performing comprehensive remote automated analysis based on sophisticated software tools and tested techniques. Progent's experience in this service saves your company money and offers an accurate portrayal of security holes. The knowledge your IT organization gains can form the basis of a network protection plan that can allow your information system to run safely and respond quickly to new risks.
Automated Vulnerability Audits
Progent provides expertise in the use of security auditing utilities such as MBSA and GFI LANguard NSS for affordably running a variety of automatic system testing checks to uncover potential security weaknesses. Progent has broad knowledge of other security analysis products including NMAP, AMAP application mapper, eEye Vulnerability Scanner, as well as utilities such as Metasploit, Netcat, and Nikto. Progent can help you to make sense of testing reports and respond appropriately.
Progent can show you how to design security into your business processes, configure scanning applications, define and deploy a secure system architecture, and recommend policies to maximize the safety of your network. Progent's security professionals are available to assist you to set up a firewall, design safe remote access to email and business applications, and integrate virtual private network. Learn additional information on Progent's automated security assessment.
Security Inventory Bundles for Small Businesses
Progent offers two low-cost security inventory and evaluation bundles intended to allow small companies to get a professional security assessment from an accredited security engineer. With Progent's External Security Inventory Checkup, a security expert administers an extensive test of your IT infrastructure from beyond your firewall to uncover possible risks in the security profile you present to the outside world. With Progent's Internal Network Security Inventory Checkup, a certified security professional executes a network scan from an authorized machine inside your firewall to assess the risk to inside assaults. The two security inventory services are configured and executed from a secured remote location. The process is overseen by a consultant who has earned top security accreditations and who generates a document that summarizes and interprets the information collected by the scan and suggests practical improvements if called for.
Network Intrusion Testing Consulting
Stealth intrusion checking is a key component of any comprehensive network security plan. Progentís security experts can perform thorough intrusion tests without the knowledge of your company's internal IT staff. Unannounced penetration checking shows whether existing security defense systems such as intrusion incident alerts and event history monitoring are correctly set up and actively monitored. Learn additional information about Progent's stealth penetration testing consulting.
Firewalls and VPN Expertise
Progent's expertise in network security solutions includes in-depth field work with leading firewalls and Virtual Private Network (VPN) technology offered by a variety of vendors including Cisco, Microsoft, and CheckPoint. Progent offers the support of consultants who have earned key industry certifications including Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Integration and Debugging
The current ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer substantially more bang for the buck than Cisco's previous firewalls and have superseded the ASA 5500 and PIX security appliances for all new deployments. Following Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X devices can be provisioned to enable Firepower Services, built on Sourcefire's Snort product, which is the world's most popular network intrusion protection system. Firepower services bring powerful new features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-premier CCIE network experts can assist your company to manage your current PIX or Cisco ASA 5500 security appliances and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your organization to plan, integrate, tune, manage and troubleshoot firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Find out additional details about Cisco ASA 5500-X Firewalls with Firepower integration and troubleshooting services.
Cisco Security and Virtual Private Network Consulting Services
Cisco's security and offsite connection products represent a comprehensive line of easy-to-administer security products to help safeguard your local and remote network infrastructure. Cisco's Virtual Private Network product family includes switches, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's expert consulting staff includes field-proven specialists with Cisco Certified Internetwork Expert and CCNP certifications who can help your organization to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that align most closely with your business objectives. Find out more information concerning Progent's Consulting Services for Cisco Security Solutions and VPN Products.
Engineering Expertise for Additional Firewall and VPN Products
Progent provides small and medium size businesses professional support for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and Virtual Private Network security vendors including WatchGuard, Juniper, and SonicWALL. Progent can show you how to create a detailed security plan and choose the right technologies from a variety of suppliers to achieve your security goals while staying within your budget limits.
Progent's Flat-rate Managed Services for Information Security
Progent's affordable ProSight family of network management outsourcing services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection service that utilizes cutting edge behavior-based machine learning technology to defend endpoints and servers and VMs against new malware assaults like ransomware and email phishing, which routinely escape legacy signature-based AV products. ProSight ASM protects on-premises and cloud-based resources and provides a single platform to automate the complete threat progression including blocking, infiltration detection, containment, remediation, and post-attack forensics. Key capabilities include single-click rollback using Windows VSS and automatic system-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection managed services deliver economical in-depth security for physical and virtual servers, workstations, smartphones, and Microsoft Exchange. ProSight ESP utilizes contextual security and advanced heuristics for continuously monitoring and reacting to cyber threats from all vectors. ProSight ESP provides firewall protection, penetration alerts, endpoint management, and web filtering through leading-edge technologies packaged within one agent accessible from a unified console. Progent's security and virtualization consultants can assist your business to design and configure a ProSight ESP deployment that addresses your company's unique needs and that helps you achieve and demonstrate compliance with government and industry information security standards. Progent will assist you specify and configure policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alarms that call for immediate action. Progent's consultants can also assist you to set up and verify a backup and disaster recovery system such as ProSight Data Protection Services so you can get back in business quickly from a potentially disastrous cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Exchange filtering.
ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services provide small and mid-sized organizations a low cost end-to-end solution for reliable backup/disaster recovery. For a low monthly rate, ProSight DPS automates your backup processes and enables fast recovery of vital files, apps and virtual machines that have become lost or corrupted as a result of component breakdowns, software bugs, disasters, human mistakes, or malicious attacks such as ransomware. ProSight DPS can help you back up, recover and restore files, folders, apps, system images, plus Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to a local device, or mirrored to both. Progent's BDR specialists can deliver world-class support to configure ProSight Data Protection Services to to comply with government and industry regulatory standards like HIPPA, FIRPA, PCI and Safe Harbor and, whenever needed, can assist you to restore your business-critical information. Learn more about ProSight DPS Managed Backup and Recovery.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering service that uses the infrastructure of top information security companies to deliver centralized control and world-class protection for all your inbound and outbound email. The powerful architecture of Progent's Email Guard combines cloud-based filtering with a local gateway device to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The Cloud Protection Layer serves as a first line of defense and keeps the vast majority of unwanted email from reaching your security perimeter. This reduces your vulnerability to inbound attacks and conserves system bandwidth and storage. Email Guard's on-premises security gateway device adds a further level of analysis for incoming email. For outbound email, the on-premises security gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also help Exchange Server to monitor and protect internal email that stays inside your corporate firewall. For more information, see ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small organization can have its critical servers and apps hosted in a protected fault tolerant data center on a high-performance virtual host configured and maintained by Progent's network support professionals. Under the ProSight Virtual Hosting service model, the client retains ownership of the data, the operating system software, and the applications. Since the system is virtualized, it can be ported immediately to a different hosting environment without a lengthy and technically risky configuration procedure. With ProSight Virtual Hosting, you are not tied one hosting service. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, maintain, retrieve and safeguard information related to your IT infrastructure, processes, applications, and services. You can instantly locate passwords or serial numbers and be alerted about upcoming expirations of SSLs ,domains or warranties. By cleaning up and managing your network documentation, you can save as much as half of time thrown away trying to find vital information about your network. ProSight IT Asset Management includes a centralized location for storing and sharing all documents related to managing your business network like recommended procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for collecting and relating IT data. Whether youíre making enhancements, doing regular maintenance, or responding to a crisis, ProSight IT Asset Management delivers the information you require the instant you need it. Find out more about Progent's ProSight IT Asset Management service.
Expert Security Planning
Every business ought to develop a thoroughly thought out security strategy that includes both preventive processes and response planning. The proactive strategy is a set of mechanisms designed to reduce vulnerabilities. The post-attack plan helps your company's security engineers to evaluate the damage caused by an attack, repair the damage, document the event, and get business functions restored as quickly as possible.
Progent's expert information security engineers are available to help your business to perform a comprehensive vulnerability assessment and define a computer security plan to establish security processes and controls to minimize future assaults and dangers.
CISM Certified Network Security Consulting Expertise
The Certified Information Security Manager (CISM) committee defines the core capabilities and global standards of skill that information security managers are expected to learn. CISM gives business management the assurance that those who have earned their CISM credential possess the experience and knowledge to deliver efficient security management and consulting services. Progent can provide the expertise of CISM Premier security professionals to assist businesses with:
Read additional details about Progent's CISM Network Security Consulting Expertise.
- Information Security Processes
- Risk Analysis
- IS Security Implementation Management
- Network Security Management
- Recovery Management
CISSP Accredited Security Consulting Expertise
CISSP denotes mastery of a global standard for data security. The American National Standards Institute has awarded the CISSP credential accreditation in the field of information protection defined by ISO/IEC 17024. Progent can provide the services of security experts who have qualified for CISSP certification. Progent can give you access to a CISSP-certified expert to help your enterprise in a broad range of security areas including:
Find out more information concerning Progent's CISSP Accredited Cybersecurity Consulting Expertise.
- Security Management Practices
- Security Architecture and Paradigms
- Access Control Solutions and Methodology
- Software Development Security
- Secure Operations
- Site Security
- Data Encryption Technology
- Telecommunications, LAN and Internet Security
- Disaster Recovery Planning
CISSP-ISSAP Qualified Secure System Architecture Engineering Expertise
Progent's CISSP-ISSAP Premier IT architecture engineers are experts who have been awarded ISSAP Certification as a result of thorough examination and significant experience with network security architecture. The ISSAP credential indicates demonstrated competence in the most challenging demands of information system security architecture within the broader scope of information security knowledge needed for CISSP accreditation. Progent's ISSAP-premier security specialists can assist your business with all aspects of architecture security such as.
Learn more information about Progent's ISSAP Certified Secure System Architecture Consulting Professionals.
- Access Management Mechanisms and Techniques
- Telecom and Network Infrastructure Protection
- Cryptography Options
- Requirements Analysis and Security Guidelines
- Business Continuity Planning (BCP) and DRP
- Hardware Security
CISA Qualified Security Auditing Engineering Support
The Certified Information Systems Auditor (CISA) accreditation is an important qualification that indicates expertise in network security auditing. Certified by the American National Standards Institute, the CISA credential requires that candidates undergo an extensive examination given by the ISACA professional group. Progent's CISA network security audit engineers can assist your company with:
Read additional information concerning Progent's CISA Qualified Network Security Auditing Consulting Expertise.
- Information Systems Audit Services
- Information Technology Enforcement
- Systems and Infrastructure Planned Useful Life
- IT Service Delivery
- Safeguarding Data Resources
- Business Continuity Planning
The CRISC certification program was initiated by ISACA in 2010 to verify a consultant's skills to design, implement, and support information system control mechanisms to reduce risk. Progent can provide the services of a CRISC-certified engineer to help your company to develop and carry out a workplace continuity or disaster recovery strategy that follows leading practices promoted by CRISC and crafted to align with your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC network risk management engineers offer a variety of risk assessment services such as:
Learn the details about Progent's CRISC Risk Management Consultants.
- Collect information and study documentation to evaluate significant vulnerabilities
- Identify statutory, industry, and contractual requirements and company standards associated with your information system to determine their potential impact on your strategic objectives
- Identify potential threats for your operational workflows to assist in analyzing your corporate risk
- Create a risk awareness initiative and provide training to make sure your organization understand IT risk so they can contribute to your risk control process
- Connect key risk vectors to your associated business procedures to help assign risk ownership
- Determine risk tolerance with executive leadership and key stakeholders to make sure they match
GIAC Accredited IS Security Engineering Expertise
GIAC was established in 1999 to certify the knowledge of IT security experts. GIAC's mission is to ensure that a certified security consultant has the knowledge needed to provide services in key areas of system, data, and program security. GIAC accreditations are recognized by companies and institutions all over the world including and the U.S. National Security Agency (NSA). Progent's GIAC-certified IS security audit experts are available to help your IT organization with:
Find out more information concerning Progent's GIAC Information Assurance Support.
- Assessing Networks
- Security Incident Response
- Traffic Analysis
- Web-based Application Security
- SIEM solutions
Talk to a Progent Security Expert
To find out how to access a certified Progent security consultant for online or onsite assistance in Oklahoma, call 1-800-993-9400 or go to Remote Network Help.