For urgent online help with computer security problems, small companies in Plano, TX, have access to world-class support from Progent's security engineers. Progent's remote support staff is available to provide efficient and economical assistance with security crises that are impacting the productivity of your network. Progent's accredited security consultants are qualified to provide help for systems powered by Microsoft, Linux, Macintosh, Solaris, and popular versions of UNIX. Progent's broad range of services covers firewall technology, messaging systems, protected system architecture, and data restoration. Progent's support staff has earned the industry's most advanced security accreditations including CISA and Information System Security Architecture Professional (ISSAP).

Progent offers remote security assistance on a per-minute model without minimum call duration and without extra fees for setup or off-hour support. By billing by the minute and by delivering world-class support, Progent's billing model keeps expenses low and eliminates situations where simple solutions entail major charges.

We've Been Attacked: What Are We Supposed to Do Now?
If your business is currently fighting a network security crisis, refer to Progent's Urgent Online Technical Help to find out how to get immediate aid.

For businesses that have planned beforehand for an attack, the step-by-step incident response model promoted by Global Information Assurance Certification is Progent's approved method of reacting to a major security incident.

Introduction to Security Support Services
Coordinating network security plus preparation for recovering vital information and systems following an attack requires an on-going program involving an array of technologies and processes. Progent's certified engineers can help your organization at any level in your efforts to safeguard your information network, ranging from security evaluation to creating a comprehensive security strategy. Important technologies covered by Progent's experts include Security Planning and Prevention, Data Restoration and Security Forensics, and Outsourced Filtering of Email-Based Spam and Viruses.

Planning and Building Secure Environments
Every organization ought to develop a carefully considered security strategy that includes both proactive and reactive activity. The pre-attack strategy is a set of precautions that works to reduce vulnerabilities. The post-attack strategy defines activities to assist security personnel to inventory the damage caused by an attack, remediate the damage, document the experience, and restore network functions as soon as possible. Progent can show you how to incorporate security into your business processes. Progent can install scanning utilities, define and build a secure network infrastructure, and recommend processes and policies to optimize the protection of your computing environment. Progent's security professionals are ready to assist you to configure a firewall, deploy safe offsite connectivity to e-mail and information, and configure an effective virtual private network.

If you are looking for an economical option for jobbing out your security administration, Progent's Round-the-clock Monitoring Options feature non-stop remote network monitoring and quick resolution of emergencies.

Data Restoration and Security Forensics
Progent has skill in restoring systems and devices that have been compromised, are quarantined, or have stopped working because of a security penetration. Progent can help determine the losses caused by the attack, restore ordinary functions, and retrieve information lost as a result of the attack. Progent's security specialists can also perform a comprehensive forensic analysis by going over event logs and utilizing a variety of advanced forensics tools. Progent's experience with security problems minimizes your downtime and allows Progent to recommend effective strategies to avoid or mitigate future assaults.

Zero Downtime Backup and Restore Solutions Based on Data Protection Manager (DPM)
Microsoft Data Protection Manager is a ground breaking backup and recovery solution utilizing fast disk systems to increase reliability, speed, and manageability. Progent's certified Microsoft DPM engineers can assist you to develop a practical disaster recovery strategy, implement an affordable high-availability IT architecture, configure a Data Protection Manager-powered backup and recovery system, thoroughly validate your system, train your administrative personnel or local service providers how to manage Microsoft DPM, or provide extensive information technology outsourcing including off-site hosting of Microsoft DPM servers in Progent's data center. For details, go to System Center Data Protection Manager Consulting Services.

Outsourced Spam Filtering
Progent has partnered with Postini to offer small businesses E-Mail Guard, a managed service that intercepts spam and email-borne viruses before they can penetrate your network firewall. Find out additional information concerning E-Mail Guard Outsourced Spam Blocking.

Specialized Security Services Offered by Progent
Progent's security engineers can provide world-class support in vital facets of IT protection such as:

Security Vulnerability Evaluation and Security Compliance Assessment
Progent offers expertise with information risk evaluation utilities such as Microsoft Baseline Security Analyzer or LANguard from GFI for performing a set of comprehensive system tests to reveal potential security gaps. Progent has extensive skills with these and similar utilities and can assist your company to understand audit reports and react appropriately. Progent's security consultants also provide web application testing and can perform thorough assessments of enterprise-wide security to assess your organization's compliance with key global security specifications such as FISMA, NIST, and ISO. Also, Progent can assess the effectiveness of your wireless security including stationary wireless appliances as well as mobile devices. Find out the details about Progent's Information Risk Evaluation and Compliance Testing.

Managing ISA Server and Forefront TMG 2010
MS ISA Server 2006 and its current version, Forefront Threat Management Gateway 2010, offers policy-based protection, improved performance, and centralized administration of complex networks by providing both a firewall and a Web acceleration mechanism integrated with Microsoft's Microsoft Windows Server operating system. The Microsoft Forefront TMG and MS ISA Server 2006 firewalls provide comprehensive data filtering, management of access policy, and traffic routing. The cache improves system performance by storing frequently requested Web data. Progent's Microsoft Forefront TMG 2010 engineers and MS ISA Server 2006 experts know how to plan and implement an Internet security gateway solution that matches your security requirements while avoiding restricting network efficiency.

Cisco PIX Firewall and ASA Firewall Expertise
Progent can offer the services of a Cisco Certified Internetwork Expert (CCIE) or Cisco Certified Network Professional (CCNP) to help you to select, deploy, and support Cisco PIX and ASA Firewalls. Learn the details concerning Cisco PIX Firewall and ASA Firewall Consulting.

Cisco Security, VPN and Aironet Wireless Consulting
Progent's Cisco CCIE engineers and Cisco CCNP experts can provide world-class consulting expertise for Cisco's entire family of security and VPN products such as PIX 500 Firewalls and ASA Series Firewalls, the Catalyst Firewall Services Module, secure broadband and IS routers, Aironet wireless access points, and Catalyst switches. Find out more details concerning Cisco Security, Virtual Private Network and Aironet Wireless Expertise.

Additional Firewall and Virtual Private Network (VPN) Solutions
As well as supporting a broad array of protection technologies from Microsoft and Cisco Systems, Progent can provide small and mid-size organizations expert engineering services for solutions from other important firewall and Virtual Private Network suppliers. Progent's engineers offer:

Unannounced Intrusion Testing Consulting
Stealth penetration testing is a key method for allowing businesses to determine how vulnerable their networks are to real-world threats by showing how effectively corporate protection processes and mechanisms hold up against authorized but unpublicized intrusion attempts launched by veteran security engineers using the latest intrusion techniques. Find out additional details concerning Progent's Penetration Testing Services.

Certified Information Security Manager (CISM) Security Support Expertise
CISM Engineers for Plano, TexasCertified Information Security Manager (CISM) identifies the fundamental competencies and international benchmarks of service that computer security professionals are expected to master. It offers business management the assurance that those who have earned their CISM have the experience and skill to offer efficient security management and consulting services. Progent can offer a CISM-certified consultant to help your enterprise in vital security areas including data security governance, risk assessment, data protection process control, and crisis response support.

Get more details about Progent's CISM Security Consulting Expertise.

CISSP Security Support Expertise
CISSP Certified System Security Specialists for Plano, TexasProgent's CISSP consultants are security specialists who have earned CISSP status as a result of verified professional work, extensive study, and exhaustive examination. CISSP qualification indicates mastery of an international standard for IT security. American National Standards Institute has granted the CISSP credential accreditation in the area of IT security under ISO/IEC 17024. Areas of knowledge covered within CISSP include security administration procedures, security design and test systems, access permission methodology, applications development security, operations security, physical security, encryption, telecommunications, Internet security, and disaster recovery planning.

Learn more information concerning Progent's Certified Information Systems Security Professionals (CISSP) Support Services.

ISSAP-Qualified Consultants for Secure Network Architecture
ISSAP ISSAP Security Engineers for Plano, TexasProgent's ISSAP certified security consultants are experts who have been awarded ISSAP status after thorough examination and substantial hands-on work with network security design. ISSAP security experts have acquired comprehensive understanding of access management mechanisms and methodologies, phone system and network protection, cryptography, needs evaluation, business continuity planning (BCP) and DRP, and physical security integration. Progent's ISSAP-qualified security experts can assist your business with all phases of architecture security.

Get more details concerning Progent's ISSAP Certified Secure System Architecture Engineering Services.

Certified Information Systems Auditor (CISA) Consulting Expertise
Certified Information Systems Auditor Engineers for Plano, TexasThe Certified Information Systems Auditor credential is a globally recognized achievement that represents mastery in information system security audit and control. Accredited by ANSI, the CISA credential has consultants pass an extensive test administered by the ISACA international professional group. Progent offers the services of a CISA-qualified security engineer trained to help businesses in the fields of IS audit process, information technology administration, network assets and infrastructure lifecycle, information technology support, safeguarding information resources, and business continuity planning.

Get additional details concerning Progent's CISA Consulting Services.

CRISC-certified Network Risk Management Experts
CRISC-certified Risk Engineers for Plano, TexasThe Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA to verify a consultant's ability to design, implement, and support IS control mechanisms to mitigate risk. Progent can provide the expertise of a CRISC-certified consultant to help you to develop and carry out a business continuity or disaster recovery strategy based on leading practices promoted by CRISC and crafted to match your company's risk tolerance, business goals, and IT budget. Progent's risk management services are a good fit the support provided by Progent's CISA-certified security engineers for impartially evaluating your IT management mechanisms and also with the expertise of Progent's CISM-certified support professionals for designing security policies.

Get the details about Progent's CRISC Risk Mitigation Support.

GIAC (Global Information Assurance Certification) Support Services
Security Experts with Global Information Assurance Certification for Plano, TexasGIAC (Global Information Assurance Certification) was founded in 1999 to validate the knowledge of computer security experts. GIAC's goal is to verify that a certified professional possesses the skills needed to provide support in vital areas of system, information, and software security. GIAC accreditations are recognized by companies and government organizations around the world including and the United States NSA. Progent offers the help of GIAC certified security engineers for all of the network security disciplines covered under GIAC accreditation topics including auditing networks, incident response, intrusion detection, and web-based services security.

Learn additional information about Progent's GIAC Support Expertise.

Contact Progent for Computer Security Support
If your company is located in Plano or anywhere in Texas and you need computer security engineering help, telephone Progent at 800-993-9400 or send email to

© 2002-2015 Progent Corporation. All rights reserved.