Computer viruses and malicious hacking are continually increasing in frequency and complexity. Threats include information loss caused by malicious intent; web-based attacks; security breaches by internal sources; and intrusions aimed at stealing or destroying important assets.

Progent's expert security consultants can help you to defend your Apple Macintosh environment by offering support services which include running security assessment, cleaning up after virus and worm attacks, configuring firewalls, designing protected offsite and mobile connectivity, installing proactive software for protection against viruses, worms, and denial of service attacks, and producing a comprehensive security plan appropriate for your business needs and IT environment.

Administering and coordinating intrusion protection and detection as well as the ability to restore critical systems requires a continual effort that involves an array of tools, processes, and policies. Progent's CISM and GIAC-certified security consultants can help your company in your efforts to protect your IT system by providing support services ranging from security assessments to developing and executing a comprehensive security strategy. Progent provides economical urgent and scheduled support both remotely and on premise to assist small and midsize companies to configure and support secure cross-platform IT environments powered by Apple Macintosh, UNIX, Linux, Windows, and Cisco technology.

Security Evaluation
Progent's certified security consultants can perform extensive security audits on your Mac OS X network by checking for missing security updates, security holes, needlessly open ports, old accounts, and password strength. During a security assessment, Progent can in addition make a detailed inventory of your company's network, detect hidden Trojans on servers and workstations, and determine whether the OS is disclosing too much information.

Progent can consult with you about ways to design security into your business operations. Progent can deploy monitoring and security assessment utilities, plan and implement a secure network architecture, and recommend procedures and policies to maximize the security of your information system. Progent's security experts are available to help you to set up a firewall, facilitate secure remote access to email, data and programs, and establish VPNs.

Disaster Recovery and Virus Cleanup
Progent has expertise in restoring systems that have been attacked, are under suspicion, or have crashed because a security breakdown. Progent can help your company to assess the damage caused by the attack, restore information lost during the breach, and allow your organization to return quickly to regular operations. Progent's expertise with security issues minimizes your lost productivity and enables Progent to propose efficient methods to prevent or ameliorate future attacks.

Security Planning
Every business ought to develop a carefully crafted security strategy that incorporates both proactive and response procedures. The proactive or defensive strategy is a set of steps that help to minimize vulnerabilities. The reactive or post-attack strategy helps security staff to evaluate the impact of an attack, repair the damage, document the event, and have business operations back on line as soon as feasible.

Progent's seasoned Mac OS X security consultants can assist your company to perform a full risk analysis and document a computer security plan to implement security policies and controls to minimize future threats.

Cisco PIX and ASA Firewalls Consulting
Progent can provide a Cisco CCIE network engineer or Cisco Certified Network Professional (CCNP) to help you to select, configure, and maintain Cisco PIX and ASA Firewalls. See more details about Cisco PIX and ASA Firewalls expertise.

Certified Support for Cisco Security and VPN Products
Progent's Cisco Certified Internetwork Experts (CCIEs) and Cisco Certified Network Professionals (CCNPs) can provide in-depth help for Cisco's entire range of security and Virtual Private Network (VPN) solutions including integrated services routers, Catalyst switches, firewalls, IDS systems, and VPN access appliances. Find out more about Progent's support for Cisco protection and Virtual Private Network products.

Additional Firewall and Virtual Private Network Solutions
As well as supporting a wide range of protection technologies from Microsoft and Cisco Systems, Progent can provide small and mid-size companies expert consulting for technologies from other major firewall and VPN vendors. Services offered by Progent include:

Outsourcing for Spam Filtering and Defense against Email-borne Threats
Progent has partnered with Postini to offer small businesses E-Mail Guard, a managed service that stops spam and email-borne attacks before they reach your defense perimeter. Learn more about Progent's E-Mail GuardSpam and Virus Filtering.

Unannounced Intrusion Assessment Services
Unannounced penetration assessment is a valuable method for allowing businesses to find out how vulnerable their information systems are to serious threats by testing how well existing network security procedures and mechanisms hold up to authorized but unannounced intrusion attempts instigated by veteran security specialists utilizing the latest intrusion techniques. Read additional details about Progent's Stealth Intrusion Assessment Consulting.

CISM (Certified Information Security Manager) Security Consulting Services
CISM identifies the basic competencies and international benchmarks of performance that information security professionals are required to achieve. CISM provides executive management the assurance that consultants who have earned their certification possess the background and knowledge to provide effective security management and consulting support. Progent can offer a CISM consultant to help your organization in vital security disciplines such as data security governance, vulnerability assessment, data security process management, and crisis response management.

Get additional details about Progent's Certified Information Security Manager (CISM) Security Consulting Expertise.

CISSP (Certified Information Systems Security Professionals) Security Support Expertise
Progent's CISSP consultants are security specialists who have been awarded CISSP status through demonstrated experience, rigorous study, and formal testing. CISSP Certification indicates expertise in an international standard for information security. American National Standards Institute has given the CISSP credential accreditation in the field of information security under ISO/IEC 17024. Fields of expertise included under CISSP include security administration practices, security architecture and test systems, connection permission systems, applications development security, business processes security, hardware security, cryptography, telecommunications, Internet security, and disaster recovery planning.

Get additional information concerning Progent's CISSP Consulting Expertise.

ISSAP (Information Systems Security Architecture Professionals) Engineering Support for Secure Network Architecture
Progent's ISSAP qualified security consultants are experts who have earned ISSAP accreditation as a result of thorough examination and substantial experience. field experience with information security design. ISSAP consultants possess in-depth understanding of access management mechanisms and techniques, telecommunications and network protection, cryptography, needs evaluation, BCP and disaster recovery planning (DRP), and physical security integration. Progent's ISSAP-qualified security specialists can assist your business with all aspects of architecture security.

Read additional information about Progent's ISSAP Certified Protected System Infrastructure Consulting Support.

CISA Consulting Services
The Certified Information Systems Auditor (CISA) accreditation is an important achievement that signifies expertise in network security auditing. Accredited by ANSI, the CISA accreditation requires that consultants undergo an extensive test given by the ISACA international professional association. Progent can provide the expertise of a CISA-certified security consultant trained to assist companies in the fields of information systems audit services, IT governance, network assets and infrastructure lifecycle, IT support, safeguarding information assets, and disaster recovery planning.

Learn additional details about Progent's Certified Information Systems Auditor Consulting Assistance.

GIAC (Global Information Assurance Certification) Professional Expertise
GIAC was founded in 1999 to certify the knowledge of network security professionals. GIAC's goal is to make sure that a certified professional possesses the knowledge needed to provide support in critical categories of system, data, and program security. GIAC certifications are recognized by companies and government organizations around the world including and the U.S. National Security Agency. Progent offers the support of certified consultants for any of the network security disciplines addressed under GIAC accreditation topics including assessing IT infrastructure, incident handling, traffic analysis, and web-based services security.

Get the details about Progent's GIAC (Global Information Assurance Certification) Consulting Services.

Get in Touch with Progent for Computer Security Help
If you want Apple Mac OS X security consulting, call Progent at 800-993-9400 or email Progent at

© 2002-2015 Progent Corporation. All rights reserved.