Computer viruses and hacking are continually increasing in frequency and sophistication. Risks include data loss as a result of malicious intent; web-based attacks; security compromises by inside sources; and intrusions aimed at stealing or destroying important assets.

Progent's certified security engineers can assist your company to protect your Apple Macintosh network by providing an array of services such as running security audits, cleaning up after virus and worm security breaches, setting up firewalls, designing protected offsite and mobile connectivity, installing automated monitors for protection against viruses, spam, and directory harvest attacks, and developing a comprehensive security plan appropriate for your business needs and IT environment.

Managing and updating intrusion protection and detection along with the ability to recover critical systems calls for a continual campaign that entails a variety of technologies, processes, and guidelines. Progent's CISM and CISA-certified security consultants can help you in your efforts to defend your information system by providing support services ranging from security assessments to developing and implementing a comprehensive security plan. Progent provides affordable urgent and project-based support both online and on premise to assist small companies to set up and support safe cross-platform networks based on Apple Macintosh, Linux, Windows, and Cisco products.

Security Assessments
Progent's certified security consultants can perform comprehensive security audits on your Mac network by checking for missing security patches, security vulnerabilities, unnecessary open ports, old user accounts, and password policy. As part of a security evaluation, Progent can also perform an inventory of your network resources, detect hidden Trojans on servers and workstations, and find out whether the OS is publicizing excessive information.

Progent can advise you concerning ways to design security into your business processes. Progent can deploy monitoring and security assessment software, plan and implement a protected network infrastructure, and propose procedures and policies to maximize the safety of your information system. Progent's security experts are available to assist you to configure a firewall, establish secure remote connectivity to email, files and applications, and implement VPNs.

System Recovery and Virus Cleanup
Progent has experience in recovering systems that have been compromised, are under suspicion, or have failed because a security breach. Progent can help your company to assess the extent of the intrusion, restore data damaged by the attack, and allow your organization to get back rapidly to normal. Progent's expertise with security issues reduces your lost productivity and enables Progent to suggest efficient strategies to prevent or defuse future attacks.

Security Strategy
Every business should have a carefully crafted security strategy that includes both protection and response procedures. The protective or pre-attack strategy is a collection of steps designed to reduce vulnerabilities. The response or post-attack strategy helps security personnel to assess the damage caused by a security breach, fix any damage, record the event, and get business functions running as soon as possible.

Progent's expert Apple Macintosh security consultants can assist you to perform a comprehensive security assessment and document a network security plan to enact security policies and enforcement to defend against future threats.

Cisco PIX Firewalls Expertise
Progent can give you access to a Cisco CCIE network engineer or Cisco Certified Network Professional (CCNP) to assist your company to select, configure, and maintain Cisco PIX and ASA Firewall appliances. Read more about Cisco PIX and ASA Firewalls consulting.

Certified Consulting for Cisco Security and VPN Solutions
Progent's Cisco CCIE network engineers and CCNP professionals can provide in-depth consulting services for Cisco's complete line of security and Virtual Private Network (VPN) products including routers, Catalyst switches, PIX and ASA firewalls, intrusion detection systems, and Virtual Private Network connection concentrator. Read more about Progent's support for Cisco protection and VPN solutions.

Additional Firewall and Virtual Private Network (VPN) Consulting Services
In addition to supporting a wide range of network security technologies available from Microsoft and Cisco, Progent offers small organizations top-level consulting for technologies from other major firewall and VPN suppliers. Consulting services available from Progent include:

Outsourcing for Spam Blocking and Protection against Viruses and DHAs
Progent has teamed up with Postini to provide small companies E-Mail Guard, a managed service that blocks spam, viruses, and Denial of Service attacks before they can penetrate your corporate firewall. See more details about Progent's E-Mail GuardSpam and Virus Blocking.

Stealth Intrusion Testing Consulting
Unannounced intrusion testing is a vital mechanism for allowing businesses to find out how exposed their IT systems are to serious threats by revealing how well existing corporate security processes and mechanisms stand up against planned but unpublicized intrusion attempts launched by veteran security specialists utilizing advanced hacking methods. Find out more details about Progent's Stealth Penetration Testing Consulting.

CISM (Certified Information Security Manager) Security Consulting Services
Certified Information Security Manager (CISM) defines the fundamental competencies and worldwide benchmarks of performance that IT security managers are required to achieve. It provides executive management the confidence that consultants who have been awarded their CISM possess the background and knowledge to offer effective security administration and consulting services. Progent can provide a CISM consultant to help your enterprise in key security disciplines such as information security governance, risk assessment, information security process control, and incident response management.

Find out more information concerning Progent's Certified Information Security Manager Security Support Assistance.

CISSP (Certified Information Systems Security Professionals) Security Support Expertise
Progent's CISSP consultants are security specialists who have earned CISSP certification through demonstrated professional work, extensive study, and formal examination. CISSP Certification indicates mastery of a worldwide standard for IT security. American National Standards Institute has granted the CISSP credential accreditation in the area of information security under ISO/IEC 17024. Areas of expertise included under CISSP include security administration procedures, security architecture and models, access control methodology, software development security, operations security, hardware security, encryption, telecommunications, Internet security, and disaster recovery planning.

Get additional information concerning Progent's Certified Information Systems Security Professionals (CISSP) Support Expertise.

ISSAP (Information Systems Security Architecture Professionals) Engineering Support for Secure IT Infrastructure
Progent's ISSAP qualified security consultants are experts who have earned ISSAP accreditation after thorough examination and significant experience. field experience with network security architecture. ISSAP security experts have in-depth understanding of access management mechanisms and techniques, telecommunications and network infrastructure protection, cryptography, needs evaluation, business continuity planning (BCP) and disaster recovery planning (DRP), and physical security integration. Progent's ISSAP-qualified security specialists can assist your company with all phases of secure network architecture.

Find out more details concerning Progent's ISSAP Certified Secure Network Infrastructure Engineering Support.

CISA (Certified Information Systems Auditor) Consulting Services
The Certified Information Systems Auditor (CISA) accreditation is a recognized achievement that signifies mastery in IS security auditing. Accredited by the American National Standards Institute, the CISA credential requires that consultants undergo a comprehensive test given by the ISACA international professional group. Progent offers the services of a CISA-qualified security audit professional able to help businesses in the areas of information systems audit services, information technology administration, systems and architecture planned useful life, information technology support, protecting information resources, and disaster recovery planning.

Find out the details concerning Progent's Certified Information Systems Auditor (CISA) Professional Assistance.

GIAC Support Expertise
Global Information Assurance Certification was established in 1999 to certify the skill of IT security experts. GIAC's goal is to assure that an accredited professional possesses the skills appropriate to provide services in critical areas of network, information, and software security. GIAC accreditations are recognized by businesses and government organizations around the world including and the United States National Security Agency (NSA). Progent can provide the help of certified professionals for all of the security disciplines covered within GIAC certification topics including auditing security systems, incident response, intrusion detection, and web application security.

Read the details about Progent's Global Information Assurance Certification Consulting Assistance.

Contact Progent for Computer Security Help
If you're trying to find Mac OS X computer security consulting expertise, telephone Progent at 800-993-9400 or send email to

© 2002-2015 Progent Corporation. All rights reserved.