Business IT networks in the state of Texas now have prompt and economical online technical support from Progent's certified network security experts to fix the toughest security issues. The cost is affordable, billing is by the minute, sign-up is immediate, and service is world class. Progent also provides help for long-term engagements that demand the services of senior security engineers with top security certifications.
In case your Texas office is located away from larger metropolitan areas like Houston, San Antonio, Dallas, Austin, Fort Worth, or El Paso, help from nearby qualified network security experts may be problematic when you have a crisis. This can result in a drop in productivity for your business, angry clients, idle employees, and defocused management. By utilizing Progent's online services, you have access to a Certified security professional who can offer assistance whenever you require it to keep your computer network operating and recover your data.
Progent can help you in a variety of ways in your initiatives to defend your IT environment with support services ranging from security checks to creating a comprehensive security plan. Progent provides affordable support to help small and midsize companies to configure and manage protected networks powered by Microsoft Windows and Cisco products and that can include computers based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as BYOD users with Apple iOS handhelds or Google Android or Windows Phone devices.
Progent can also assist you to outsource spam filtering and protection from e-mail-based assaults. Email Guard is Progent's email security platform that incorporates the technology of leading data security companies to deliver centralized management and comprehensive protection for all your email traffic. The powerful structure of Email Guard managed service integrates a Cloud Protection Layer with a local security gateway device to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based threats. The cloud filter serves as a preliminary barricade and keeps the vast majority of threats from reaching your network firewall. This decreases your vulnerability to inbound threats and conserves network bandwidth and storage. ProSight Email Guard's on-premises gateway device provides a further layer of inspection for inbound email. For outbound email, the local gateway provides anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The onsite gateway can also enable Exchange Server to monitor and safeguard internal email that stays within your corporate firewall.
Progent's certified experts are available online or in person to provide a range of emergency or project-based computer security services including:
If your business has an immediate need for IT security support, refer to Progent's Emergency Online Technical Support.
Progent's engineers offer advanced services in vital areas of network security that include security evaluation, firewalls and VPN, and advanced security consulting.
Progent's expert security consultants can evaluate the strength of your current computer security environment by performing exhaustive remote automated testing based on sophisticated software tools and proven techniques. Progent's skill in administering this testing saves you money and offers an objective portrayal of security holes. The knowledge your IT organization is provided can be used as the basis of a security strategy that will permit your information system to operate safely and respond rapidly to future risks.
Automated Network Vulnerability Assessment
Progent provides expertise in the application of security auditing products such as MBSA and GFI LANguard for affordably running a variety of programmed network auditing scans to identify potential security gaps. Progent has extensive knowledge of other security auditing utilities such as NMAP Port Scanner, AMAP Application Scanner, eEye, plus tools like Metasploit Framework, Netcat, Hydra, and Nikto. Progent can show you how to understand testing reports and respond effectively.
Progent can show you how to build protection into your company processes, configure auditing software, define and implement a secure network environment, and recommend procedures to optimize the security of your IT system. Progent's security professionals are able to help you set up a firewall, design secure remote access to email and business applications, and install virtual private network. Learn additional information on Progent's network security evaluation.
Security Inventory Service Bundles for Small Businesses
Progent has put together two low-cost security inventory bundles intended to enable small businesses to receive an objective security evaluation from a certified security engineer. With Progent's External Network Security Inventory Scan, an engineer runs a comprehensive examination of your IT infrastructure from beyond your company firewall to uncover possible risks in the security profile you present to the public. With Progent's Internal Security Inventory Scan, a certified security professional runs a network scan from an authorized machine within your firewall to uncover your exposure to inside threats. The two security inventory packages are set up and executed from a secured remote site. The project is managed by a consultant with high-level security credentials and who generates a report that details and analyzes the information collected by the security scan and proposes cost-effective improvements where called for.
Network Intrusion Analysis Support Services
Stealth penetration checking is a key part of any comprehensive IT system security plan. Progentís security professionals can run extensive intrusion tests without the awareness of your company's in-house IT staff. Stealth penetration checking uncovers whether existing security monitoring tools such as intrusion incident warnings and event history analysis are properly configured and actively checked. Learn additional information concerning Progent's network security penetration analysis consulting.
Firewalls and VPN Support
Progent's expertise in network security solutions includes in-depth familiarity with leading firewalls and VPN products from a variety of vendors including Cisco, Microsoft, and Symantec. Progent offers the support of consultants who have earned important networking certifications such as CCIE and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Integration and Troubleshooting
The new Cisco ASA 5500-X Series of firewalls with Firepower Services provide significantly more performance than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 security appliances for new installations. After Cisco's acquisition of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be configured to enable Firepower Services, built on Sourcefire's Snort technology, which is the world's most deployed network intrusion protection system (IPS). Firepower services bring powerful new features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist your company to manage your current PIX or ASA 5500 firewalls or upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your organization to plan, deploy, tune, administer and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Find out more details about Cisco ASA 5500-X Firewalls with Firepower Services integration and debugging services.
Cisco Security and Virtual Private Network Support Expertise
Cisco's network security and remote connection products provide a complete range of manageable security products to help protect your local and remote network infrastructure. Cisco's Virtual Private Network line features switches, firewalls, intrusion detection systems and VPN concentrators. Progent's professional staff of consultants includes experienced engineers with Cisco's Certified Internetwork Expert and CCNP qualifications who are able to help your business to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that align best with your company goals. Learn additional information about Progent's Consulting Expertise for Cisco Security and VPN Appliances.
Support Services for Other Firewall and VPN Solutions
Progent provides small and medium size businesses professional support for Intrusion Protection products and IPsec VPN products from major firewall and VPN security companies such as Check Point Software, Juniper Networks, and SonicWALL. Progent can show you how to create a detailed security strategy and select the right technologies from multiple suppliers to achieve your security goals while staying within your budget restraints.
Progent's Fixed-price Managed Services for Information Security
Progent's low-cost ProSight family of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that utilizes next generation behavior machine learning technology to guard endpoint devices as well as physical and virtual servers against modern malware assaults such as ransomware and file-less exploits, which routinely evade legacy signature-based AV tools. ProSight Active Security Monitoring protects on-premises and cloud resources and provides a unified platform to address the entire threat lifecycle including protection, identification, containment, remediation, and post-attack forensics. Top features include one-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) services offer ultra-affordable multi-layer security for physical servers and VMs, desktops, smartphones, and Exchange Server. ProSight ESP utilizes adaptive security and advanced heuristics for round-the-clock monitoring and responding to cyber threats from all vectors. ProSight ESP delivers two-way firewall protection, intrusion alarms, endpoint control, and web filtering through leading-edge technologies incorporated within one agent accessible from a single console. Progent's data protection and virtualization consultants can help you to design and implement a ProSight ESP environment that meets your company's unique requirements and that allows you prove compliance with legal and industry data protection standards. Progent will assist you specify and implement policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alarms that call for urgent action. Progent can also assist your company to install and test a backup and restore solution like ProSight Data Protection Services so you can get back in business quickly from a potentially disastrous cyber attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection unified endpoint security and Microsoft Exchange filtering.
ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services from Progent offer small and medium-sized organizations a low cost end-to-end service for secure backup/disaster recovery. Available at a fixed monthly cost, ProSight DPS automates your backup activities and allows rapid recovery of critical data, apps and virtual machines that have become lost or damaged due to component failures, software bugs, natural disasters, human mistakes, or malware attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to a local device, or to both. Progent's cloud backup specialists can deliver world-class support to configure ProSight DPS to be compliant with government and industry regulatory standards like HIPPA, FINRA, PCI and Safe Harbor and, whenever needed, can assist you to recover your business-critical data. Learn more about ProSight Data Protection Services Managed Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that incorporates the infrastructure of leading data security companies to deliver centralized control and comprehensive security for all your inbound and outbound email. The powerful structure of Email Guard integrates a Cloud Protection Layer with a local security gateway device to offer advanced protection against spam, viruses, Dos Attacks, DHAs, and other email-borne malware. Email Guard's Cloud Protection Layer acts as a preliminary barricade and blocks the vast majority of unwanted email from reaching your network firewall. This decreases your vulnerability to inbound attacks and saves system bandwidth and storage space. Email Guard's on-premises gateway appliance adds a deeper layer of inspection for incoming email. For outgoing email, the onsite gateway provides anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The on-premises security gateway can also help Microsoft Exchange Server to track and safeguard internal email that stays within your corporate firewall. For more details, visit Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and apps hosted in a protected Tier III data center on a high-performance virtual machine host set up and managed by Progent's network support professionals. Under the ProSight Virtual Hosting model, the customer retains ownership of the data, the operating system platforms, and the applications. Because the system is virtualized, it can be ported easily to a different hosting solution without a lengthy and technically risky configuration procedure. With ProSight Virtual Hosting, your business is not locked into a single hosting service. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, maintain, retrieve and safeguard data about your network infrastructure, processes, applications, and services. You can quickly find passwords or serial numbers and be warned about impending expirations of SSL certificates or domains. By updating and organizing your IT infrastructure documentation, you can eliminate up to 50% of time wasted trying to find vital information about your network. ProSight IT Asset Management includes a common repository for holding and sharing all documents related to managing your business network like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers advanced automation for gathering and associating IT data. Whether youíre making enhancements, doing maintenance, or responding to a crisis, ProSight IT Asset Management delivers the data you require as soon as you need it. Learn more about Progent's ProSight IT Asset Management service.
Certified Security Design
Every company ought to develop a carefully thought out security strategy that incorporates both pre-attack procedures and reaction planning. The proactive plan is a collection of steps designed to reduce vulnerabilities. The post-attack strategy assists your security personnel to assess the damage resulting from an attack, repair the damage, document the event, and get the IT network restored as soon as possible.
Progent's expert information security engineers are available to help your business to perform a complete vulnerability evaluation and define a computer security strategy to establish security processes and controls to mitigate ongoing attacks and dangers.
CISM Accredited Security Engineering Assistance
The CISM organization describes the basic capabilities and international standards of skill that information security professionals are expected to learn. CISM gives business management the assurance that consultants who have earned their CISM credential possess the experience and knowledge to deliver effective security management and support consulting. Progent can provide the expertise of CISM Certified security consultants to help businesses with:
Learn additional details about Progent's CISM Information Security Support Services.
- Information Security Processes
- Vulnerability Analysis
- IS Security Implementation Management
- IS Security Administration
- Response Planning
CISSP Qualified Security Engineering Assistance
CISSP denotes expertise with a global standard for information security. ANSI (American National Standards Institute) has awarded certification recognition in the area of information protection defined by ISO 17024. Progent offers the services of security professionals who have earned CISSP accreditation. Progent can give you access to a CISSP-certified professional to help your enterprise in a variety security areas including:
Find out additional information about Progent's CISSP Accredited Information Security Consulting Services.
- Security Management Procedures
- Security Infrastructure and Paradigms
- Access Control Systems and Processes
- Applications Development Security
- Operations Security
- Site Security
- Encryption/Decryption Mechanisms
- Telecommunications, Network and Internet Security
- Disaster Recovery Preparedness
CISSP-ISSAP Qualified Secure IT Architecture Consulting Support
Progent's CISSP-ISSAP Premier network architecture professionals are consultants who have been awarded ISSAP Certification through thorough examination and extensive work with information security architecture. The ISSAP credential represents proven competence in the most challenging requirements of IS security architecture bounded by the wider field of information security knowledge required for CISSP certification. Progent's ISSAP-premier security experts can help your business with all phases of architecture security including.
Read more information about Progent's ISSAP Certified Secure System Architecture Support Professionals.
- Access Control Systems and Methodologies
- Telecom and System Infrastructure Security
- Cryptography Options
- Requirements Analysis and Security Criteria
- BCP and Disaster Recovery Planning (DRP)
- Hardware Security
CISA Qualified Information System Security Auditing Engineering Expertise
The CISA credential is a recognized achievement that represents mastery in IS security audit and control. Certified by the American National Standards Institute, the CISA accreditation has consultants pass a comprehensive examination given by the ISACA professional group. Progent's CISA network security audit specialists are available to help your company in the areas of:
Get additional details about Progent's CISA Qualified IS Security Auditing Consulting Services.
- Information Systems Audit Services
- IT Enforcement
- Systems and Architecture Lifecycle Planning
- IT Service Delivery
- Safeguarding Information Assets
- Disaster Recovery Planning
Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC program was established by ISACA in 2010 to verify a consultant's ability to plan, deploy, and maintain IS controls to reduce risk. Progent can provide the services of a CRISC-certified consultant to help you to develop and carry out a workplace continuity strategy that follows industry best practices identified by CRISC and geared to align with your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC-qualified IT risk mitigation experts can provide a range of risk assessment services including:
Find out more details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Gather information and review documentation to help identify major vulnerabilities
- Identify legal, regulatory, and contractual mandates and organizational policies associated with your network to determine their possible impact on your business goals
- Identify possible vulnerabilities for your operational workflows to help in evaluating your corporate risk
- Create a risk awareness initiative and conduct seminars to make sure your organization understand IT risk so they can contribute to your risk management program
- Match key risk vectors to your associated business processes to help assign risk responsibility
- Validate risk appetite with executive management and key stakeholders to ensure they are in agreement
GIAC Qualified Security Consulting Expertise
GIAC was founded in 1999 to validate the knowledge of IT security engineers. GIAC's goal is to assure that an accredited security consultant has the knowledge necessary to deliver support in vital areas of network, information, and program security. GIAC certifications are acknowledged by companies and government organizations throughout the world including and the United States NSA. Progent's GIAC security audit experts can assist your IT organization in the areas of:
Read more details about Progent's GIAC Information Assurance Expertise.
- Assessing Networks
- Incident Response
- Intrusion Detection
- Web Application Security
- SIEM solutions
Talk to a Progent Security Specialist
To see how to get in touch with a security engineer for online or onsite help in Texas, phone 1-800-993-9400 or visit Online Network Support.