Viruses and malicious hacking are continually growing in frequency and sophistication. Threats include data loss as a result of malicious intent; web-based viruses, worms, and denial of service attacks; security compromises by inside sources; and intrusions aimed at stealing or destroying important assets.

Progent's certified security consultants can help you to defend your Mac OS X network by providing an array of services which include performing security audits, cleaning up after serious attacks, setting up firewalls, designing safe remote and mobile access, installing proactive monitors for defense against viruses, spam, and directory harvest attacks, and developing a company-wide security strategy that fits your business needs and network environment.

Administering and coordinating virus protection and discovery along with the ability to restore vital systems calls for a continual campaign that entails an array of tools, procedures, and policies. Progent's CISM and CISA-certified security consultants can help you in your attempts to protect your IT system by providing consulting services that run from security audits to developing and implementing a corporate-wide security strategy. Progent offers economical emergency and scheduled help both remotely and on premises to assist small and midsize businesses to set up and support secure cross-platform IT environments based on Mac, Linux, Microsoft Windows, and Cisco technology.

Security Assessments
Progent's seasoned security experts can carry out comprehensive security audits on your Mac network by checking for outdated or missing security updates, security vulnerabilities, needlessly open ports, old user accounts, and password policy. During a security audit, Progent can also perform an inventory of your network resources, uncover potential Trojans on servers and workstations, and find out whether the operating system is disclosing too much information.

Progent can consult with you concerning how to design protection into your business processes. Progent can install scanning and security assessment software, plan and implement a protected network infrastructure, and recommend procedures and policies to maximize the safety of your information system. Progent's security consultants are ready to help you to configure a firewall, establish protected remote access to messaging, data and applications, and establish virtual private networks.

Disaster Recovery and Virus Removal
Progent has expertise in restoring computers that have been compromised, are under suspicion, or have crashed because a security breakdown. Progent can assist your company to evaluate the damage caused by the attack, restore data damaged by the breach, and allow your business to return quickly to regular operations. Progent's experience with security engineering minimizes your lost productivity and enables Progent to recommend efficient strategies to avoid or ameliorate future assaults.

Security Planning
Every organization should develop a seriously thought out security strategy that incorporates both protection and response procedures. The proactive or pre-attack strategy is a collection of mechanisms designed to minimize exposure. The reactive or post-attack plan enables security personnel to evaluate the impact of an attack, repair any damage, document the event, and have company functions back on line as soon as possible.

Progent's expert Mac security engineers can assist your organization to perform a full security evaluation and document a computer security plan to implement protection policies and controls to minimize potential attacks.

Cisco PIX and ASA Firewalls Support
Progent can provide a Cisco CCIE network engineer or CCNP professional to assist your company to identify, deploy, and support Cisco ASA Firewalls. See more details about Cisco ASA Firewalls support.

Certified Consulting for Cisco Protection and Virtual Private Network Products
Progent's Cisco Certified Internetwork Experts (CCIEs) and Cisco Certified Network Professionals (CCNPs) can provide world-class consulting services for Cisco's entire line of security and Virtual Private Network (VPN) solutions including routers, switches, PIX and ASA firewalls, intrusion detection systems, and VPN connection concentrator. Learn more about Progent's help for Cisco security and Virtual Private Network technology.

Other Firewall and Virtual Private Network Solutions
As well as supporting a broad array of network security technologies from Microsoft and Cisco, Progent offers small and mid-size companies expert consulting for products from other popular firewall and Virtual Private Network (VPN) suppliers. Consulting services available from Progent include:

Inbound and Outbound Spam and Virus Protection and Email Encryption
Email Guard is Progent's email security solution that incorporates the technology of leading information security companies to deliver centralized management and world-class protection for all your inbound and outbound email. The powerful architecture of Email Guard managed service integrates cloud-based filtering with a local security gateway appliance to provide complete defense against spam, viruses, DoAs, Directory Harvest Attacks, and other email-borne malware. Email Guard's Cloud Protection Layer acts as a preliminary barricade and blocks the vast majority of threats from reaching your network firewall. This decreases your vulnerability to inbound threats and conserves system bandwidth and storage space. Email Guard's on-premises gateway appliance adds a deeper level of inspection for inbound email. For outgoing email, the local gateway provides AV and anti-spam protection, DLP, and encryption. The on-premises gateway can also help Microsoft Exchange Server to track and protect internal email that originates and ends within your corporate firewall.

Unannounced Intrusion Testing Consulting
Stealth intrusion assessment is a valuable technique for allowing organizations to understand how vulnerable their IT systems are to real-world threats by showing how effectively existing network security procedures and technologies hold up against planned but unannounced penetration efforts launched by veteran security engineers utilizing the latest hacking techniques. Learn additional information concerning Progent's Unannounced Intrusion Testing Services.

CISM (Certified Information Security Manager) Security Consulting Expertise
CISM defines the basic competencies and worldwide standards of performance that computer security managers are expected to master. CISM offers business management the assurance that those who have earned their certification possess the background and knowledge to offer efficient security management and engineering services. Progent can offer a CISM-certified consultant to help your enterprise in vital security disciplines such as data protection governance, vulnerability assessment, information security process control, and crisis handling management.

Read more details concerning Progent's CISM Security Support Services.

CISSP Security Consulting Services
Progent's CISSP experts are security engineers who have earned CISSP status through verified experience, extensive study, and formal examination. CISSP qualification recognizes expertise in a worldwide standard for IT security. ANSI has given the CISSP credential accreditation in the area of information security under ISO/IEC 17024. Fields of expertise covered within CISSP include security management procedures, security architecture and models, access control systems, applications development security, operations security, physical security, encryption, communications, network security, and disaster recovery planning.

Learn additional details about Progent's Certified Information Systems Security Professionals (CISSP) Consulting Services.

ISSAP Consulting Support for Secure Network Infrastructure
Progent's ISSAP certified security experts are consultants who have earned ISSAP accreditation as a result of thorough testing and substantial hands-on work with information security architecture. ISSAP consultants possess comprehensive knowledge of access management systems and methodologies, telecommunications and network infrastructure protection, cryptography, requirements analysis, business continuity and DRP, and physical security integration. Progent's ISSAP-qualified security experts can assist your company with all aspects of architecture security.

Get additional details concerning Progent's ISSAP Accredited Secure System Infrastructure Engineering Support.

CISA (Certified Information Systems Auditor) Consulting Services
The CISA credential is a prestigious achievement that signifies expertise in network security auditing. Accredited by the American National Standards Institute (ANSI), the CISA credential has consultants undergo an extensive examination given by the ISACA international professional association. Progent offers the expertise of a CISA-qualified security audit consultant able to help companies in the areas of IS audit process, information technology enforcement, network assets and architecture planned useful life, information technology service delivery, safeguarding information resources, and disaster recovery preparedness.

Read additional details about Progent's Certified Information Systems Auditor Support Assistance.

GIAC Professional Services
GIAC was established in 1999 to certify the knowledge of IT security engineers. GIAC's mission is to verify that an accredited professional possesses the skills needed to provide support in vital areas of network, data, and application security. GIAC accreditations are recognized by companies and institutions throughout the world including and the U.S. National Security Agency (NSA). Progent can provide the assistance of GIAC certified security engineers for any of the network security disciplines addressed within GIAC certification programs such as assessing IT infrastructure, incident handling, intrusion detection, and web services security.

Read more details about Progent's Global Information Assurance Certification Professional Services.

Get in Touch with Progent for Computer Security Expertise
If you need Mac OS X security expertise, call Progent at 800-993-9400 or send email to

© 2002-2016 Progent Corporation. All rights reserved.