Viruses and malicious hacking are continually growing in volume and sophistication. Risks include information loss as a result of malicious intent; Internet-based viruses, worms, and denial of service attacks; security compromises by inside sources; and intrusions aimed at stealing or destroying important resources.

Progent's expert security consultants can assist your company to protect your Mac network by offering support services such as running security audits, cleaning up after virus and worm security breaches, setting up firewalls, implementing protected remote and mobile connectivity, deploying proactive monitors for protection against email and web-borne attacks, and producing a company-wide security plan that fits your company goals and IT environment.

Managing and coordinating virus prevention and discovery as well as the capability to recover vital systems demands an on-going campaign that entails an array of tools, procedures, and guidelines. Progent's GIAC and CISSP-qualified security engineers can assist your company in your attempts to defend your information system by providing support offerings that run from security audits to developing and executing a corporate-wide security strategy. Progent offers affordable urgent and scheduled support both remotely and on premise to help small businesses to configure and maintain safe multi-vendor networks powered by Apple Mac OS X, Linux, MS Windows, and Cisco technology.

Security Audits
Progent's seasoned security consultants can carry out extensive security audits on your Mac OS X environment by detecting missing security updates, security vulnerabilities, unnecessary open ports, unused accounts, and password strength. As part of a security evaluation, Progent can in addition perform an inventory of your network resources, uncover hidden Trojans on networked computers, and determine if the OS is publicizing excessive information.

Preventive Measures
Progent can consult with you about ways to build security into your business processes. Progent can deploy monitoring and security assessment utilities, define and install a protected network architecture, and propose mechanisms and policies to optimize the security of your information system. Progent's security consultants are available to assist you to configure a firewall, facilitate protected remote access to messaging, files and applications, and implement virtual private networks.

Disaster Recovery and Virus Removal
Progent has expertise in recovering systems that have been attacked, are suspect, or have crashed because a security breakdown. Progent can assist you to assess the extent of the intrusion, restore data damaged during the attack, and allow your business to return quickly to normal operations. Progent's expertise with security solutions reduces your lost productivity and enables Progent to recommend efficient strategies to avoid or contain future assaults.

Security Planning
Every business should have a carefully thought out security strategy that incorporates both proactive and reactive plans. The proactive or defensive plan is a set of mechanisms that help to reduce vulnerabilities. The response or recovery strategy enables security staff to assess the damage caused by an attack, repair any damage, document the experience, and have business operations back on line as quickly as feasible.

Progent's expert Mac OS X security engineers can assist your company to execute a comprehensive security analysis and document a network security strategy to enact security policies and controls to minimize future threats.

Cisco PIX and ASA Firewalls Consulting
Progent can give you access to a Cisco CCIE network engineer or CCNP professional to help your company to identify, configure, and support Cisco PIX Firewall appliances. Learn more about Cisco PIX Firewalls expertise.

Certified Support for Cisco Protection and Virtual Private Network Solutions
Progent's Cisco CCIE network engineers and Cisco Certified Network Professionals (CCNPs) can provide in-depth help for Cisco's entire line of security and Virtual Private Network products including routers, switches, PIX and ASA firewalls, IDS systems, and VPN access appliances. See more details about Progent's expertise for Cisco protection and Virtual Private Network products.

Additional Firewall and VPN Consulting Services
In addition to being expert in a wide array of protection technologies from Microsoft and Cisco Systems, Progent can provide small businesses expert consulting for products from other major firewall and VPN vendors. Consulting services available from Progent include:

Outsourcing for Spam Blocking and Protection against Email-borne Threats
Progent has teamed up with Postini to provide small companies E-Mail Guard, a service that blocks spam, viruses, and Directory Harvest Attacks before they reach your defense perimeter. Learn more about Progent's E-Mail GuardSpam and Virus Blocking.

Stealth Penetration Assessment Services
Stealth penetration assessment is a vital technique for helping companies to determine how open their IT systems are to serious threats by testing how well existing network protection processes and mechanisms hold up to planned but unpublicized intrusion attempts launched by seasoned security engineers using the latest hacking methods. Get more information concerning Progent's Stealth Intrusion Assessment Services.

CISM Security Consulting Services
CISM identifies the fundamental skills and worldwide benchmarks of service that IT security managers are required to master. CISM provides business management the assurance that those who have been awarded their certification have the background and skill to provide efficient security management and consulting support. Progent can offer a CISM-certified expert to assist your organization in vital security disciplines including information protection governance, risk assessment, data security process control, and crisis handling support.

Find out additional details concerning Progent's Certified Information Security Manager (CISM) Security Consulting Services.

CISSP Security Consulting Services
Progent's Certified Information Systems Security Professionals (CISSPs) are security engineers who have earned CISSP certification through verified professional work, rigorous study, and exhaustive examination. CISSP Certification indicates expertise in a worldwide standard for IT security. ANSI has granted the CISSP status official recognition in the field of IT security under ISO/IEC 17024. Fields of expertise covered under CISSP include security management procedures, security architecture and models, access permission methodology, software development security, business processes security, physical security, encryption, communications, Internet security, and business continuity planning.

Get more information about Progent's CISSP Support Assistance.

ISSAP (Information Systems Security Architecture Professionals) Engineering Services for Protected IT Infrastructure
Progent's ISSAP certified security experts are experts who have earned ISSAP certification as a result of thorough examination and significant hands-on work with network security design. ISSAP consultants have acquired in-depth understanding of access control mechanisms and methodologies, phone system and network protection, cryptography, needs evaluation, business continuity and disaster recovery, and physical security. Progent's ISSAP-certified security experts can help your business with all phases of secure network architecture.

Learn additional information about Progent's ISSAP Accredited Protected IT Architecture Consulting Assistance.

CISA Support Expertise
The Certified Information Systems Auditor (CISA) credential is a recognized qualification that represents expertise in IS security auditing. Accredited by the American National Standards Institute (ANSI), the CISA accreditation has consultants pass an exhaustive test given by the ISACA professional association. Progent offers the services of a CISA-qualified security engineer trained to assist businesses in the fields of information systems audit services, IT governance, network assets and architecture planned useful life, information technology service delivery, safeguarding information resources, and business continuity preparedness.

Read more details about Progent's CISA Consulting Services.

GIAC Support Expertise
Global Information Assurance Certification was founded in 1999 to validate the skill of IT security engineers. GIAC's mission is to verify that a certified security consultant has the skills needed to deliver support in vital areas of network, data, and application security. GIAC accreditations are recognized by companies and government organizations throughout the world including and the United States NSA. Progent can provide the expertise of certified consultants for any of the security disciplines covered under GIAC certification programs including assessing security systems, incident handling, traffic analysis, and web-based application security.

Read additional details concerning Progent's GIAC Support Expertise.

Get in Touch with Progent for Computer Security Support
If you want Mac computer security support services, call Progent at 800-993-9400 or send email to

© 2002-2015 Progent Corporation. All rights reserved.