Company information networks in the state of Alabama now have quick and affordable online technical support from Progent's qualified network security professionals to resolve the toughest security issues. Rates are competitive, charges are per minute, sign-up is quick, and service is unbeatable. Progent also provides help for complex projects that demand the knowledge of senior security engineers with high-level industry credentials.
If your Alabama company is away from larger urban neighborhoods like Birmingham, Birmingham, Mobile, or Huntsville, access to local qualified network security professionals could be limited during a crisis. This can cause lost productivity for your business, angry customers, idle workers, and defocused executives. By calling Progent, you have access to a qualified security consultant ready to provide expertise whenever you have to have it to keep your system operating and recover your data.
Progent can assist you in all your efforts to protect your information system with services ranging from security checks to creating a comprehensive security plan. Progent provides economical service to assist companies of any size to configure and maintain secure IT environments powered by Windows and Cisco products and that can include computers running UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as BYOD users with Apple handhelds or Android or Windows Phone smart phones and tablets.
Progent can also assist you to outsource spam blocking and protection from email-borne assaults. Email Guard is Progent's email security platform that uses the services and infrastructure of leading data security vendors to provide centralized control and comprehensive security for all your email traffic. The powerful structure of Progent's Email Guard combines cloud-based filtering with an on-premises gateway device to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne malware. The cloud filter serves as a first line of defense and blocks the vast majority of threats from making it to your network firewall. This reduces your vulnerability to inbound attacks and conserves network bandwidth and storage. ProSight Email Guard's on-premises security gateway device adds a deeper layer of analysis for incoming email. For outbound email, the local security gateway provides anti-virus and anti-spam protection, DLP, and email encryption. The onsite security gateway can also help Microsoft Exchange Server to track and protect internal email traffic that stays inside your corporate firewall.
Progent's security experts are accessible online or on premises to offer a variety of urgent or longer-term computer security services which include:
If your company has an immediate need for IT security support, go to Progent's Emergency Remote Technical Support.
Progent's support professionals offer advanced services in key facets of computer security that include auditing, firewall and VPN solutions, and high-level security planning.
Progent's certified security engineers can evaluate the vulnerability of your existing computer security systems through comprehensive remote automated testing based on advanced software tools and tested procedures. Progent's skill in administering this service saves you time and money and offers a detailed picture of gaps. The information your business is provided can make up the basis of a network protection plan that can allow your information system to operate safely and react rapidly to new threats.
Automated Vulnerability Audits
Progent provides consulting in the application of security evaluation software such as Microsoft's MBSA and LANguard from GFI for economically performing a set of programmed network auditing scans to identify possible security weaknesses. Progent has broad experience with other security analysis tools such as NMAP Port Scanner, AMAP application mapper, eEye, as well as utilities such as Metasploit, Netcat, Socat, and Nikto. Progent can help you to make sense of audit reports and respond effectively.
Progent can show you how to design protection into your business operations, configure scanning applications, plan and deploy a protected system environment, and recommend procedures to optimize the safety of your network. Progent's security professionals are ready to help you configure a firewall, design secure remote connectivity to email and business applications, and integrate virtual private network. Find out more concerning Progent's network security audits.
Security Inventory Scanning Bundles for Small Businesses
Progent has put together two ultra-affordable security inventory scanning packages intended to allow small companies to receive a professional network security assessment from an accredited security expert. With Progent's External Network Security Inventory Checkup, an engineer administers a comprehensive examination of your network from beyond your firewall to determine potential weaknesses in the security profile you present to the public. With Progent's Internal Network Security Inventory Scan, an engineer executes a system scan from a secure computer within your firewall to evaluate your exposure to inside assaults. The two security inventory services are set up and run from a protected remote location. The project is directed by a consultant who has earned high-level security accreditations and who produces a document that details and interprets the information collected by the security scan and proposes cost-effective remediation if called for.
Network Penetration Testing Consulting
Stealth penetration checking is a key component of any successful network security plan. Progent’s security professionals can run thorough intrusion tests without the knowledge of your organization's internal network support resources. Stealth penetration testing shows whether existing security defense systems such as intrusion detection warnings and event history monitoring are correctly configured and actively checked. Learn additional information concerning Progent's network penetration analysis support services.
Firewall And Virtual Private Network (VPN) Solutions
Progent's expertise in security solutions includes in-depth familiarity with leading firewalls and VPN technology from multiple companies including Cisco, Microsoft, and Symantec. Progent offers the support of consultants with key industry accreditations such as CCIE and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Integration and Troubleshooting
The latest generation of ASA 5500-X Family of firewalls with Firepower Services offer substantially more bang for the buck than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX 500 firewalls for all new deployments. Following Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort technology, which is the market's most popular intrusion protection system. Firepower services provide enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network experts can help you to maintain your existing PIX or Cisco ASA 5500 firewalls and upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite help with ASA 5500-X firewalls with Firepower Services and can help your organization to plan, deploy, tune, administer and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Find out more information about Cisco ASA Firewalls with Firepower integration and debugging support.
Cisco Security and VPN Engineering Expertise
Cisco's network security and remote access products offer a complete line of easy-to-administer security products to help safeguard your wired and wireless network infrastructure. Cisco's VPN line includes switches, firewalls, intrusion detection systems and VPN appliances. Progent's expert consulting staff includes field-proven engineers with Cisco's CCIE and Cisco Certified Network Professional certifications who are able to assist your organization to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that align most closely with your company goals. Find out additional information concerning Progent's Support Expertise for Cisco Security Solutions and Virtual Private Network Appliances.
Support Services for Other Firewall and VPN Solutions
Progent offers small and mid-size businesses expert consulting for Intrusion Protection products and IPsec VPN solutions from major firewall and VPN security companies including WatchGuard, Juniper Networks, and SonicWALL. Progent can help you create a comprehensive security plan and select the right technologies from multiple vendors to achieve your security objectives while sticking within your budget restraints.
Progent's Low-Cost Managed Services for Information Security
Progent's affordable ProSight line of network management outsourcing services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that utilizes next generation behavior machine learning technology to guard endpoint devices and physical and virtual servers against new malware attacks like ransomware and email phishing, which routinely evade traditional signature-based AV tools. ProSight ASM safeguards local and cloud resources and offers a unified platform to automate the entire malware attack lifecycle including blocking, infiltration detection, mitigation, cleanup, and forensics. Top features include one-click rollback using Windows Volume Shadow Copy Service and automatic network-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Endpoint Protection
ProSight Enhanced Security Protection managed services deliver ultra-affordable in-depth protection for physical servers and virtual machines, desktops, smartphones, and Microsoft Exchange. ProSight ESP utilizes contextual security and advanced heuristics for round-the-clock monitoring and reacting to security threats from all attack vectors. ProSight ESP offers two-way firewall protection, intrusion alerts, device management, and web filtering via leading-edge technologies incorporated within a single agent managed from a single control. Progent's security and virtualization consultants can help your business to plan and implement a ProSight ESP deployment that addresses your company's specific requirements and that allows you achieve and demonstrate compliance with legal and industry data protection standards. Progent will help you define and configure policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alarms that require urgent action. Progent's consultants can also assist your company to install and test a backup and disaster recovery solution such as ProSight Data Protection Services (DPS) so you can recover quickly from a potentially disastrous cyber attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Microsoft Exchange email filtering.
ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent provide small and medium-sized businesses an affordable end-to-end service for secure backup/disaster recovery (BDR). Available at a fixed monthly cost, ProSight DPS automates and monitors your backup processes and enables rapid restoration of critical data, applications and virtual machines that have become lost or damaged as a result of component failures, software bugs, disasters, human error, or malware attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images/, as well as Microsoft Hyper-V and VMware virtual machine images/. Critical data can be backed up on the cloud, to an on-promises storage device, or to both. Progent's backup and recovery consultants can deliver world-class support to set up ProSight DPS to to comply with regulatory standards like HIPPA, FIRPA, and PCI and, whenever necessary, can assist you to recover your critical information. Read more about ProSight Data Protection Services Managed Cloud Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the technology of top information security companies to provide web-based control and comprehensive security for your inbound and outbound email. The hybrid architecture of Email Guard managed service combines a Cloud Protection Layer with an on-premises security gateway device to provide complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The cloud filter acts as a first line of defense and keeps the vast majority of unwanted email from reaching your network firewall. This decreases your vulnerability to inbound attacks and saves network bandwidth and storage. Email Guard's onsite gateway appliance provides a further level of analysis for incoming email. For outgoing email, the onsite security gateway provides anti-virus and anti-spam protection, protection against data leaks, and email encryption. The local security gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email traffic that stays inside your security perimeter. For more information, visit ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and applications hosted in a secure Tier III data center on a high-performance virtual machine host configured and maintained by Progent's network support professionals. Under the ProSight Virtual Hosting service model, the client retains ownership of the data, the OS platforms, and the apps. Since the environment is virtualized, it can be moved easily to an alternate hardware solution without requiring a time-consuming and difficult reinstallation process. With ProSight Virtual Hosting, your business is not tied a single hosting provider. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, maintain, retrieve and safeguard information about your network infrastructure, procedures, applications, and services. You can instantly locate passwords or serial numbers and be alerted about impending expirations of SSL certificates or domains. By updating and organizing your IT documentation, you can save as much as 50% of time spent trying to find critical information about your IT network. ProSight IT Asset Management features a centralized location for storing and collaborating on all documents related to managing your network infrastructure like recommended procedures and How-To's. ProSight IT Asset Management also offers advanced automation for gathering and associating IT information. Whether you’re making improvements, doing maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the data you need as soon as you need it. Learn more about ProSight IT Asset Management service.
Expert Network Security Planning
Every company ought to have a thoroughly considered security program that incorporates both proactive processes and reaction plans. The proactive strategy is a collection of mechanisms designed to minimize vulnerabilities. The reactive plan helps your company's network security personnel to evaluate the impact caused by a security penetration, repair the network, document the experience, and get the IT network operational as soon as feasible.
Progent's expert IS security engineers can to help your company to run a complete risk evaluation and create a computer security plan to implement security processes and controls to mitigate ongoing attacks and dangers.
CISM Certified System Security Consulting Expertise
The CISM organization describes the core competencies and worldwide standards of skill that information security professionals are expected to master. It gives executive management the assurance that those who have earned their CISM certification possess the experience and capability to provide effective security management and consulting services. Progent can provide the services of CISM certified security consultants to help companies with:
Read more information about Progent's CISM Certified IS Security Consulting Services.
- Network Security Governance
- Vulnerability Analysis
- Network Security Program Management
- IS Security Administration
- Response Planning
CISSP Qualified Security Consulting Services
The CISSP credential recognizes mastery of a global standard for data security. The American National Standards Institute has awarded certification recognition in the field of data security under ISO 17024. Progent offers the services of security professionals who have qualified for CISSP accreditation. Progent can provide a CISSP-certified expert to help your enterprise in a variety security areas including:
Learn more information about Progent's CISSP Accredited Cybersecurity Support Services.
- Security Administration Practices
- Security Infrastructure and Models
- Access Control Solutions and Methodology
- Software Development Security
- Secure Operations
- Physical Security
- Encryption/Decryption Mechanisms
- Telecom, Network and WAN Security
- Business Continuity Preparedness
CISSP-ISSAP Accredited Secure Information System Architecture Engineering Support
Progent's CISSP-ISSAP qualified IT architecture engineers are consultants who have earned ISSAP status through thorough testing and significant work with network security architecture. The ISSAP certification represents demonstrated competence in the most in-depth requirements of IS security architecture bounded by the broader scope of IS security expertise needed for CISSP certification. Progent's ISSAP-qualified security experts can help your company with all phases of architecture security including.
Find out additional details about Progent's ISSAP Certified Secure Information System Architecture Engineering Professionals.
- Access Management Mechanisms and Methodologies
- Phone System and Network Protection
- Cryptography Options
- Requirements Analysis and Security Standards
- Business Continuity Planning and Disaster Recovery Planning
- Hardware Security
CISA Accredited Information System Security Auditing Consulting Services
The CISA accreditation is a recognized achievement that represents mastery in IS security auditing. Certified by the American National Standards Institute (ANSI), the CISA credential requires that candidates undergo a comprehensive test given by the ISACA professional association. Progent's CISA network security audit engineers can assist your business in the areas of:
Get additional information about Progent's CISA Qualified Information System Security Auditing Engineering Assistance.
- Information Systems Audit Services
- IT Administration
- Systems and Infrastructure Lifecycle
- IT Service Delivery
- Safeguarding Data Resources
- Disaster Recovery Preparedness
The CRISC certification program was established by ISACA to verify a consultant's skills to design, deploy, and support IS control mechanisms to reduce risk. Progent offers the services of a CRISC-certified engineer to help your company to create and execute a business continuity or disaster recovery plan that follows industry best practices identified by CRISC and crafted to align with your organization's risk appetite, business goals, and IT budget. Progent's CRISC network risk management consultants offer a variety of risk identification services such as:
Get the details concerning Progent's CRISC Risk Management Experts.
- Gather information and review documentation to identify major risk scenarios
- Identify legal, regulatory, and contractual requirements and organizational policies associated with your network to assess their potential influence on your business goals
- Identify possible vulnerabilities for your operational processes to help in analyzing your corporate risk
- Create a risk awareness program and provide seminars to make sure your organization appreciate IS risk so they can contribute to your risk management program
- Match key risk scenarios to related business procedures to help assign risk ownership
- Determine risk tolerance with your senior leadership and key stakeholders to ensure they are in agreement
GIAC Qualified Security Engineering Support
GIAC was founded in 1999 to validate the knowledge of IT security professionals. GIAC's mission is to verify that an accredited security consultant has the knowledge needed to deliver support in critical areas of network, information, and application security. GIAC certifications are recognized by businesses and government organizations around the world including and the United States NSA. Progent's GIAC-certified security audit consultants are available to assist your company with:
Read more details about Progent's GIAC Information Assurance Support.
- Auditing Perimeters
- Incident Response
- Traffic Analysis
- Web Services Security
- SIEM solutions
Talk to a Security Specialist
To find out how to get in touch with a certified security consultant for remote or on-premises assistance in Alabama, phone 1-800-993-9400 or visit Online Computer Support.