Viruses and malicious hacking are continually growing in volume and complexity. Threats include data loss caused by malicious intent; Internet-based attacks; security compromises by internal sources; and intrusions aimed at stealing or damaging important resources.

Progent's expert security engineers can help your company to defend your Mac network by offering an array of services such as performing security audits, cleaning up after virus and worm attacks, configuring firewalls, designing protected offsite and wireless connectivity, deploying proactive monitors for defense against email and web-borne attacks, and creating a comprehensive security strategy that fits your company goals and network environment.

Administering and updating virus prevention and detection as well as the capability to restore vital IT resources requires a continual effort that involves an array of tools, procedures, and guidelines. Progent's GIAC and CISSP-certified security engineers can help you in your efforts to protect your IT network by offering support services ranging from security audits to creating and executing a corporate-wide security strategy. Progent offers affordable emergency and project-based support both remotely and on site to help small and midsize companies to set up and maintain safe multi-vendor networks based on Apple Macintosh, UNIX, Linux, MS Windows, and Cisco technology.

Security Assessments
Progent's seasoned security engineers can carry out extensive audits on your Apple Mac OS X environment by checking for outdated or missing security updates, security holes, needlessly open ports, old user accounts, and password strength. During a security audit, Progent can in addition perform an inventory of your company's network resources, detect hidden Trojans on networked computers, and determine if the operating system is publicizing too much information.

Progent can advise you about ways to design protection into your business operations. Progent can deploy monitoring and auditing software, define and install a protected network infrastructure, and recommend procedures and policies to optimize the security of your information system. Progent's security experts are available to assist you to configure a firewall, facilitate secure offsite connectivity to messaging, data and programs, and establish virtual private networks (VPNs).

Disaster Recovery and Virus Removal
Progent has expertise in restoring computers that have been attacked, are suspect, or have failed as a result of a security breach. Progent can assist your company to assess the damage caused by the attack, recover data damaged by the attack, and enable your business to get back rapidly to regular operations. Progent's experience with security solutions minimizes your lost productivity and enables Progent to suggest proven strategies to prevent or ameliorate future attacks.

Security Planning
Every company ought to have a carefully crafted security plan that incorporates both proactive and reactive procedures. The proactive or pre-attack plan is a set of steps designed to minimize exposure. The reactive or post-attack plan enables security staff to assess the damage caused by a security breach, repair any damage, record the experience, and have business functions back on line as quickly as feasible.

Progent's expert Apple Macintosh security engineers can help your organization to execute a comprehensive security evaluation and document a computer security strategy to implement security policies and controls to minimize potential attacks.

Cisco PIX and ASA Firewalls Expertise
Progent can give you access to a Cisco Certified Internetwork Expert (CCIE) or CCNP professional to assist your company to identify, configure, and maintain Cisco ASA Firewalls. Learn more about ASA 5500-X Firewalls with Firepower expertise.

Professional Support for Cisco Security and VPN Products
Progent's Cisco CCIE network engineers and Cisco Certified Network Professionals (CCNPs) can provide in-depth consulting for Cisco's complete range of security and Virtual Private Network (VPN) products including integrated services routers, Catalyst switches, PIX and ASA firewalls, intrusion detection systems, and VPN access appliances. Learn more about Progent's help for Cisco protection and VPN technology.

Additional Firewall and Virtual Private Network (VPN) Technologies
In addition to being expert in a broad array of protection solutions available from Microsoft and Cisco, Progent can provide small and mid-size businesses expert consulting for technologies from other popular firewall and Virtual Private Network (VPN) vendors. Support services offered by Progent include:

Spam and Virus Filtering and Email Encryption
ProSight Email Guard is Progent's email spam and content filtering platform that uses the services and infrastructure of leading information security vendors to provide centralized control and comprehensive protection for all your email traffic. The hybrid architecture of Email Guard integrates a Cloud Protection Layer with an on-premises security gateway appliance to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. ProSight Email Guard's Cloud Protection Layer serves as a first line of defense and keeps most unwanted email from making it to your security perimeter. This decreases your exposure to external attacks and saves network bandwidth and storage. ProSight Email Guard's onsite gateway device provides a further level of inspection for incoming email. For outgoing email, the onsite security gateway offers AV and anti-spam protection, protection against data leaks, and encryption. The local security gateway can also help Exchange Server to track and protect internal email traffic that originates and ends within your corporate firewall.

Stealth Intrusion Testing Consulting
Unannounced penetration assessment is a key technique for helping companies to determine how vulnerable their IT environments are to real-world attacks by testing how effectively current network protection procedures and mechanisms stand up to planned but unpublicized intrusion attempts launched by veteran security specialists using advanced intrusion methods. Learn more details concerning Progent's Stealth Penetration Assessment Services.

CISM (Certified Information Security Manager) Security Consulting Services
Certified Information Security Manager (CISM) defines the fundamental competencies and worldwide standards of performance that information security professionals are required to master. CISM provides executive management the assurance that consultants who have earned their CISM have the experience and skill to offer effective security administration and consulting services. Progent can offer a CISM consultant to help your enterprise in critical security disciplines such as data security governance, risk assessment, data security process control, and incident response support.

Learn additional details concerning Progent's Certified Information Security Manager (CISM) Security Consulting Expertise.

CISSP Security Support Services
Progent's CISSP consultants are security engineers who have earned CISSP accreditation through demonstrated professional work, extensive study, and formal examination. CISSP qualification recognizes expertise in an international standard for IT security. American National Standards Institute has granted the CISSP status accreditation in the field of information security under ISO/IEC 17024. Fields of expertise included under CISSP include security administration procedures, security architecture and test systems, connection control methodology, applications development security, business processes security, physical security, encryption, communications, Internet security, and disaster recovery planning.

Find out the details concerning Progent's CISSP Support Expertise.

ISSAP (Information Systems Security Architecture Professionals) Engineering Services for Secure IT Architecture
Progent's ISSAP certified security consultants are experts who have been awarded ISSAP status as a result of thorough examination and substantial hands-on work with network security design. ISSAP security experts have acquired comprehensive understanding of access control mechanisms and methodologies, phone system and network infrastructure protection, cryptography, requirements analysis, business continuity planning (BCP) and disaster recovery planning (DRP), and physical security. Progent's ISSAP-certified security consultants can assist your company with all phases of architecture security.

Read more details about Progent's ISSAP Accredited Secure System Infrastructure Engineering Assistance.

CISA Support Services
The CISA credential is a recognized achievement that indicates mastery in information system security auditing. Certified by ANSI, the CISA accreditation has consultants undergo an exhaustive test given by the ISACA professional association. Progent offers the expertise of a CISA-qualified security engineer trained to assist businesses in the areas of IS audit services, IT administration, systems and infrastructure lifecycle, IT support, protecting information resources, and business continuity preparedness.

Find out additional information about Progent's Certified Information Systems Auditor (CISA) Consulting Assistance.

GIAC (Global Information Assurance Certification) Consulting Services
GIAC (Global Information Assurance Certification) was established in 1999 to validate the knowledge of network security professionals. GIAC accreditations are recognized by companies and government organizations all over the world including and the U.S. National Security Agency. Progent's GIAC-certified information assurance consultants offer support for any of the security disciplines addressed within the GIAC certification such as auditing network security mechanisms, event management and response, intrusion detection, web-based application security and security information and event management (SIEM) solutions for compliance with government requirements for reporting incidents.

Read more information about Progent's GIAC (Global Information Assurance Certification) Support Services.

Depend on Progent for Network Security Support
If you need Apple Macintosh security engineering help, telephone Progent at 800-993-9400 or visit Contact Progent.

© 2002- 2018 Progent Corporation. All rights reserved.