Cisco PIX family firewalls and ASA Series adaptive security appliances combine comprehensive firewall, intrusion protection, and Virtual Private Network (VPN) functionality in an affordable, one-cabinet package. Both of these product lines have been superseded by Cisco's ASA 5500-X line of firewalls with Firepower Services. (See configuration and debugging expertise for ASA 5500-X firewalls with Firepower Services.) Still, both PIX and first-generation ASA 5500 Series adaptive security appliances are widely used and continue to offer small and mid-size organizations a reliable security environment.

Cisco PIC and the original ASA 5500 firewalls offer powerful user and application policy enforcement, mutlivector assault defense, and safe connectivity services. The increased knowledge sharing of consolidated protection services in a stand-alone package provides customers implementing these integrated solutions the benefits of enhanced protection, reduced cost of ownership, and smaller maintenance expense.

Cisco PIX firewalls and Cisco's ASA 5500 Series join IOS Firewall, the Firewall Services Module for Catalyst 6500 Series switches, and Cisco 7600 Series routers as parts of Cisco's versatile, integrated firewall solutions. Based on an expandable, building-block platform, each device is designed with a particular feature set to provide more efficient security to different networking environments. These solutions can be individually installed to protect specific facets of the connectivity infrastructure, or can be grouped for a layered, protection-in-depth approach following the design leading practices outlined in the Cisco SAFE framework. Completing the modular firewall solutions, Cisco has developed a comprehensive security management portfolio, ranging from Cisco security device and Cisco IOS security components and built-in appliance controllers, to standalone management programs, helping to ensure that customers can effectively use their Cisco security infrastructure investments.

Cisco PIX Security Appliance Series
Cisco PIX Security Appliance Series deliver reliable policy support, multi-source attack defense, and safe networking features in economical, easy-to-deploy solutions. These specialized devices offer a broad range of integrated protection and networking capabilities such as process-aware firewall services, Voice over IP and multimedia security, robust site-to-site and remote-connectivity IPcec VPN networking, high availability, smart networking services, and versatile administration solutions. The Cisco PIX firewall product line ranges from small plug-and-play appliances for small or at home offices to stackable gigabit products with investment protection for large business and ISP environments, Cisco PIX firewalls provide high levels of security, performance, and reliability for networks of all sizes.

Cisco PIX Security Consulting Firm

Built upon a tested, purpose-built OS that offers a wealth of protection services, PIX security appliances provide a high level of security and have earned Common Criteria Evaluation Assurance Level (EAL) 4 status and ICSA Labs Firewall and IPsec certification. Cisco PIX security appliances provide protection for a broad range of Voice over IP and additional mixed-media standards including H.323 Version 4, Session Initiation Protocol (SIP), Cisco Skinny Client Control Protocol, Real-Time Streaming Protocol, and MGCP, enabling organizations to safeguard deployments of a wide array of contemporary and upcoming Voice over IP and mixed-media applications.

PIX firewalls offer a variety of configuration, tracking, and troubleshooting options, giving businesses the versatility to use the techniques that most closely meet their requirements. Management options include common, policy-based administration tools, integrated web-based administration, and support for remote-tracking protocols such as Simple Network Management Protocol and syslog. The integrated Adaptive Security Device Manager interface provides a world-class web-accessible control platform that greatly simplifies the deployment, ongoing modification, and monitoring of a single Cisco PIX security appliance without requiring any additional software other than an ordinary web browser and Java plug-in to be running on an administrator's computer.

IT managers can also remotely configure, monitor, and troubleshoot PIX firewalls via a command-line interface. Secure CLI interface communication is available using a number of methods such as Secure Shell (SSHv2) Protocol, Telnet through IPsec, and out-of-band via a console port. Cisco PIX firewalls also include dependable auto-update capabilities, a set advanced protected remote-management services that make sure that firewall configurations and software images are kept current.

Cisco Adaptive Security Appliances Firewalls
Cisco Adaptive Security Appliances (ASA) 5500 Series Firewalls are purpose-built devices that incorporate market-proven, best-of-breed security and VPN support with an adaptive architecture. The result is a robust, versatile network security solution better suited to defend small and medium company and larger networks and, simultaneously, lower the overall installation and operations expenses previously associated with this enhanced level of security.

Cisco ASA Firewalls Professional Services
Cisco Adaptive Security Appliances (ASA) 5500 Series Firewalls build on technology developed for Cisco's PIX 500 family Security Appliance, the Cisco IPS 4200 family sensor, and the VPN 3000 family concentrator. These solutions converge on the Cisco Adaptive Security Appliances (ASA) Firewall product line to offer a firewall that stops a broad range of threats. Cisco ASA Firewalls provide application security, local containment and control, and safe Virtual Private Network functionality across Cisco's product line. This broad scope of security enables the guarding of any network section, which includes the most typical threat conduits such as remote sites, locally-connected inside users, and off-site access Virtual Private Networks.

Cisco ASA firewalls provide strong application security through smart, application-aware inspection processes that analyze traffic at Layers 4-7. This results in a more secure environment including web, voice, and mobile wireless access. To protect environments from application-layer attacks and to give organizations more control over the applications and protocols utilized in their networks, Cisco's inspection engines incorporate extensive application and protocol knowledge and employ protection enforcement technologies such as protocol anomaly detection and state monitoring. Also included are attack detection and remediation techniques including application and protocol command filtering and URL deobfuscation. Cisco Adaptive Security Appliances 5500 Series firewall inspection engines also deliver control over IM and tunneling applications, enabling businesses to police usage policies and recover network bandwidth for critical business applications.

At the same time as increasing network security, Cisco ASA firewalls also lower installation and support costs. By providing extensive VPN and protection services, the Cisco ASA 5500 Series firewall can be used as the single device for many uses, allowing product standardization. The Cisco Adaptive Security Appliances 5500 Series firewall can be deployed as a consolidated threat-protection appliance at the datacenter by leveraging its connectivity control, process inspection, and malicious assault remediation capabilities. The Cisco Adaptive Security Appliances (ASA) firewall can also be deployed as a specialized remote connectivity device using its VPN features. Alternatively, the Cisco Adaptive Security Appliances (ASA) firewall performs equally well in the network interior for inter-office access control and to guard against malware inside users might unwittingly release into the network. In small company and satellite office networks, the Cisco Adaptive Security Appliances firewall serves as a total solution platform offering complete intrusion defense and VPN services while suiting the cost structure and operational demands of these deployments.

This versatile single-platform, many-use design reduces the number of devices that must be deployed and managed while providing a standard operating and management environment throughout all those installations. This approach streamlines the education of setup, tracking, support, and security personnel. To further reduce maintenance expenses, Cisco ASA 5500 Series firewalls are also highly network aware, allowing these devices to integrate gracefully into the environment without interfering with legitimate data flow and applications.

How Progent's Consultants Can Help Your Business with Cisco Firewalls
Cisco's ASA Series firewalls and PIX firewalls provide a wealth of setup, monitoring, and analysis options that give you the ability to set up these security appliances to align optimally with your company's requirements. Progent's CCIE certified network experts can help you to maintain your current network infrastructure that incorporates Cisco ASA and/or PIX security appliances and that offers security, resilience, throughput, and manageability. Progent's firewall experts can also help you to migrate to Cisco ASA 5500-X firewalls with Firepower Services.

Progent's CISA and CISSP-ISSP-certified information security professionals can help your business to create a security policy that makes sense for your environment and can configure your firewall to support your security strategy. Progent's risk assessment engineers can evaluate the strength of your existing firewall deployment and help determine the overall security of your whole IS environment. Progent's Help Desk support team can deliver emergency online technical support for Cisco products and can give you fast access to a Cisco CCIE network engineer.

To see additional information concerning Progent's engineering support for Cisco products, pick a topic:

To ask Progent about technical assistance for Cisco networking, call 1-800-993-9400 or see Contact Progent.



An index of content::

  • 24 Hour Work at Home Technical Support Services Top Technical Support Teleworker Integration

  • Microsoft GP/Great Plains Support and Integration
    24-Hour Dynamics GP Accounting Computer Consulting

    Progent can show you how to plan and implement an efficient move to Microsoft Dynamics GP so that you retain your information, improve your security, enhance your analytics, take full advantage of Microsoft Office integration, and minimize productivity disruption by designing and following a smart migration strategy. Progent can also help train new Dynamics GP 2010 users so you don't waste productivity. Progent can enhance your company reports and management analytics by providing Crystal Reports consulting, FRx assistance, and Excel support. Progent's experience with Microsoft .NET technology, Microsoft SQL Server solutions, and designing with VBasic, XML and other tools make it possible to produce specialized line-of-business applications and eCommerce programs that integrate seamlessly with Dynamics GP.

  • 24x7 Dallas MongoLock Crypto-Ransomware Settlement Negotiation Experts Downtown Dallas Dallas Ryuk Crypto-Ransomware Settlement Negotiation Expertsn Dallas
  • At Home Workforce Assistance in San Diego UCSD - Backup/Recovery Solutions Consulting San Diego, CA San Diego UCSD At Home Workers Backup Solutions Expertise San Diego-UCSD, CA
  • BlackBerry Software Tech Ottawa 24 Hour BlackBerry Email Software Consulting Firm
  • Calgary Canada Network Management Calgary Canada Computer Service Companies
  • Centennial Offsite Workforce Solutions Guidance Centennial-Arapahoe County, Colorado Remote Workforce Consulting Experts nearby Centennial - Connectivity Solutions Consulting Centennial-Lone Tree
  • Cybersecurity Contractor CISSP Ribeirao Preto Ribeirão Preto Security Consultancies Firewall
  • Des Moines Ransomware Removal and Data Recovery Des Moines International Airport DSM 24-Hour Des Moines Maze Crypto-Ransomware Rollback Des Moines, IA
  • Cisco PIX Firewall Remote Technical Support
  • Email Guard Data Loss Prevention Consulting Services ProSight Spam Filtering Professional
  • Exchange Server 2013 Computer Network Consultant Mobile, AL Exchange Server 2013 Networking Consultancy Mobile Alabama, U.S.A.
  • Fargo Crypto-Ransomware Recovery Fargo-Fargo, ND Fargo Critical Crypto-Ransomware Repair Consulting Fargo-Minot, North Dakota
  • Firewall Security Organizations CISSP Network Security Auditor Dallas Fort Worth Metroplex, United States
  • Fort Myers Network Outsource 24-7 Fort Myers, Florida Small Business Specialist
  • Fremont Small Business IT Consulting Company Urgent Fremont Configure
  • IT Service Provider Microsoft and Apple Richmond California, USA Microsoft and Apple Remote Support Services Richmond San Pablo Hercules
  • IT Technical Support Company Manchester-Salford 24/7 Manchester-Bolton Network Architect
  • Immediate Small Business Network Support Windows Albuquerque New Mexico Windows Server 2019 Small Office Computer Consulting Bernalillo County New Mexico
  • Information Technology Consulting Firm Exchange Server 2013 Santos Microsoft Exchange Server 2007 Small Office Network Consultant Praia Grande, Santos

  • Careers Microsoft Certified
    Network Engineer Job Opportunity

    Progent is seeking a variety of on-staff employees such as solutions-driven Microsoft Certified Systems Engineers; system experts who have Cisco CCNP or CCIE credentials; and consultants for fault-tolerant network design with experience in mobile access, wireless integration, non-stop systems, business continuity planning, data preservation, and virtual servers. Progent is also seeking desktop support technicians, remote service professionals, and CISSP or CISM certified security consultants. We are also looking for experienced managers and administrators who can operate efficiently in our dynamic, virtual office model. Progent contracts freelance consultants with in-depth expertise and hands-on background in crucial information technology topics beyond Progent's primary technical focus. Progent's Experts Team hires independent consultants who can provide advice and programming support for strategic applications such as Manufacturing Resource Planning, Enterprise Resource Planning, or Customer Relationship Management; possess specialized knowledge of non-Microsoft operating systems such as Linux derivatives, Macintosh, or Solaris, or can provide expert skills in technologies like telecom, web site development, Electronic Data Interchange, web commerce, or database management. Independent contractors premier by Progent coordinate with Progent's in-house consultants to provide end-to-end solutions for small and midsize company networks.

  • Jacksonville Florida SQL Network Design and Configuration Support Team SQL Florida
  • Joinville Joinville Ryuk Crypto-Ransomware Business Recovery Consultants Joinville Joinville Locky Crypto-Ransomware Remediation
  • Kern County California Cisco Server Consulting Cisco Small Business IT Consulting Companies Bakersfield, Kern County, USA

  • Remote NinjaOne Server Monitoring Network Consultants
    24-7 ProSight NinjaOne Automatic Patch Management On-site Support

    ProSight LAN Watch with NinjaOne RMM is Progent's network, server and endpoint remote monitoring managed service that incorporates advanced remote monitoring and management technology to help keep your network operating efficiently by checking the state of critical devices.

  • Lakeland Ryuk Crypto-Ransomware Negotiation Consulting Lakeland Lakeland Sodinokibi Crypto-Ransomware Settlement Expertise Lakeland

  • network infrastructure documentation management Professional
    Consulting Services password management

    ProSight IT Asset Management is a cloud-based IT documentation management service that makes it easy to capture, maintain, find and protect data related to your IT infrastructure, processes, business apps, and services. You can instantly locate passwords or IP addresses and be alerted about impending expirations of SSL certificates or warranties. By cleaning up and organizing your IT documentation, you can eliminate as much as 50% of the time thrown away looking for critical information about your IT network. ProSight IT Asset Management includes a centralized location for holding and collaborating on all documents related to managing your network infrastructure like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers advanced automation for gathering and associating IT data. Whether you're planning improvements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the knowledge you need the instant you need it.

  • Lima-La Victoria Computer Consultant Microsoft Experts Onsite Computer Services Lima-Miraflores
  • PIX Remote Support
  • Microsoft Exchange 2016 Online Troubleshooting Lima, San Isidro Miraflores District Exchange Server 2013 Migration
  • Pasadena Emergency Teleworkers Pasadena Expertise - Network Security Solutions Consulting At Home Workers Pasadena Assistance - Network Security Solutions Assistance Pasadena Texas

  • Professionals 64-bit Migration
    64-bit Processing Consulting Services

    Progent's Microsoft-certified consultants can help you design, document, carry out, manage, and repair a network-wide move to 64-bit server and client operating systems and business applications. Progent can help you test your 64-bit infrastructure to verify that it supports all of the key 32-bit applications that you intend to retain as well as the latest 64-bit versions of applications you plan to run.

  • Portland Snatch Crypto-Ransomware Forensics Analysis Portland - Hillsboro Portland Dharma Crypto-Ransomware Forensics Investigation Portland, Multnomah County
  • Ransomware Hot Line Cupertino, CA Egregor Ransomware Hot Line Santa Clara County
  • Remote Consulting Fedora Linux, Sun Solaris, UNIX Jacksonville Florida Jacksonville Arlington 24-Hour Ubuntu Linux, Solaris, UNIX Network Consultants
  • SCDPM and Azure IT Services SCDPM and Windows Server 2012 IT Services
  • San Diego-UCSD Small Business Computer Consulting Firms San Diego Small Business IT Outsourcing Firms
  • Top Quality Remote Workers Knoxville Consulting Experts - Collaboration Systems Consultants Knox County Tennessee, United States Offsite Workforce Guidance in Knoxville - Collaboration Systems Guidance Knoxville, Knox County
  • Urgent IT Staff Temps for Network Support Groups IT Staffing Temps for IT Service Organizations Reno, Washoe County
  • Windows Server 2016 Small Office IT Outsourcing Uberlandia, Estado de Minas Gerais Uberlandia Consulting Services Windows Server 2012 R2
  • PIX 500 Firewall Online Support Services
  • Work at Home Employees Detroit Consultants - Endpoint Management Tools Consulting Services Wayne County Michigan Work from Home Employees Guidance near Detroit - Management Systems Expertise Detroit, Wayne County
  • Work from Home Employees Midland Expertise - Cloud Integration Systems Consulting Experts Midland Texas Midland 24-Hour Work from Home Employees Midland Assistance - Cloud Integration Systems Assistance

  • Cybersecurity Tech Services Juniper SA4500 SSL VPN
    Network Security Test Juniper SSL VPN

    SSL VPN makes it possible to establish a secure Internet connection between an enterprise network and virtually any remote computer without the need for pre-installed client software. Progent's Juniper-certified consultants can help you design, manage, and troubleshoot SSL VPN solutions based on Juniper's AS Series of remote access appliances.


    © 2002-2025 Progent Corporation. All rights reserved.