Viruses and malicious hacking are continually increasing in frequency and complexity. Threats include data loss as a result of malicious intent; Internet-based attacks; security breaches by inside sources; and attacks aimed at taking or destroying important resources.

Progent's certified security consultants can assist your company to defend your Mac OS X network by providing an array of services which include running security audits, cleaning up after serious security breaches, setting up firewalls, implementing protected remote and wireless connectivity, deploying proactive monitors for protection against viruses, worms, and denial of service attacks, and developing a company-wide security plan appropriate for your company goals and IT environment.

Managing and coordinating virus prevention and discovery along with the capability to restore critical systems requires a continual effort that involves a variety of tools, processes, and policies. Progent's CISM and GIAC-certified security engineers can assist your company in your attempts to defend your IT system by offering support services that run from security assessments to creating and executing a comprehensive security strategy. Progent offers economical emergency and scheduled support both online and on premise to assist small and midsize companies to configure and maintain secure cross-platform networks powered by Apple Mac OS X, UNIX, Linux, MS Windows, and Cisco technology.

Security Audits
Progent's seasoned security experts can carry out comprehensive security audits on your Mac environment by detecting outdated or missing security patches, security holes, needlessly open ports, abandoned user accounts, and password policy. As part of a security assessment, Progent can also make a detailed inventory of your company's network resources, uncover potential Trojans on networked computers, and find out if the operating system is disclosing too much information.

Preventive Measures
Progent can consult with you concerning ways to build protection into your business operations. Progent can deploy scanning and auditing software, plan and install a protected network infrastructure, and recommend mechanisms and policies to optimize the security of your information system. Progent's security experts are ready to help you to configure a firewall, facilitate protected remote connectivity to messaging, files and applications, and establish virtual private networks.

System Recovery and Virus Removal
Progent has expertise in recovering computers that have been attacked, are under suspicion, or have crashed as a result of a security breakdown. Progent can assist you to evaluate the extent of the intrusion, recover data lost by the attack, and enable your organization to get back rapidly to normal operations. Progent's experience with security issues reduces your downtime and enables Progent to propose proven methods to avoid or defuse future attacks.

Security Planning
Every business should develop a carefully thought out security strategy that includes both proactive and response plans. The proactive or pre-attack plan is a collection of steps designed to reduce vulnerabilities. The response or post-attack strategy helps security staff to evaluate the damage caused by an attack, fix the damage, record the experience, and have company functions running as quickly as feasible.

Progent's seasoned Mac security engineers can assist you to perform a comprehensive risk assessment and document a network security plan to implement protection policies and controls to minimize potential threats.

Cisco PIX Firewalls Consulting
Progent can provide a Cisco CCIE network engineer or Cisco Certified Network Professional (CCNP) to help you to select, deploy, and support Cisco PIX and ASA Firewall appliances. See more details about Cisco PIX Firewalls support.

Certified Consulting for Cisco Security and VPN Solutions
Progent's Cisco CCIE network engineers and Cisco Certified Network Professionals (CCNPs) offer in-depth support for Cisco's entire line of security and Virtual Private Network (VPN) solutions including routers, Catalyst switches, firewalls, IDS systems, and Virtual Private Network connection appliances. See more details about Progent's support for Cisco security and Virtual Private Network technology.

Other Firewall and Virtual Private Network Solutions
As well as being expert in a broad array of security solutions from Microsoft and Cisco, Progent offers small companies expert support for technologies from other major firewall and Virtual Private Network vendors. Consulting services offered by Progent include:

Managed Services for Spam Filtering and Defense against Viruses and DHAs
Progent has partnered with Postini to provide small businesses E-Mail Guard, a service that blocks spam and email-borne attacks before they reach your defense perimeter. Learn more about Progent's E-Mail GuardE-Mail Guard Spam and Virus Filtering.

Unannounced Intrusion Testing Consulting
Unannounced penetration testing is a vital technique for helping companies to find out how exposed their IT environments are to real-world threats by revealing how thoroughly current network protection policies and mechanisms hold up to planned but unpublicized penetration efforts launched by veteran security engineers using the latest intrusion methods. Read more details concerning Progent's Stealth Penetration Testing Consulting.

CISM Security Support Expertise
Certified Information Security Manager (CISM) defines the basic skills and worldwide benchmarks of performance that IT security managers are expected to master. It provides executive management the confidence that consultants who have earned their accreditation possess the background and skill to provide effective security management and consulting services. Progent can offer a CISM expert to assist your enterprise in vital security disciplines such as information protection governance, risk management, data security process management, and crisis handling support.

Learn additional information about Progent's Certified Information Security Manager (CISM) Security Consulting Expertise.

CISSP Security Support Services
Progent's CISSP experts are security engineers who have been awarded CISSP status as a result of verified experience, extensive study, and formal examination. CISSP qualification recognizes mastery of an international standard for IT security. American National Standards Institute has given the CISSP status official recognition in the area of IT security under ISO/IEC 17024. Fields of knowledge included within CISSP include security management practices, security architecture and test systems, access permission systems, software development security, business processes security, physical security, cryptography, communications, network security, and business continuity planning.

Find out more information about Progent's CISSP Support Assistance.

ISSAP Consulting Support for Secure System Architecture
Progent's ISSAP qualified security consultants are experts who have been awarded ISSAP status after rigorous examination and extensive hands-on work with information security design. ISSAP security experts possess comprehensive understanding of access control systems and methodologies, phone system and network protection, cryptography, requirements analysis, business continuity planning (BCP) and disaster recovery planning (DRP), and physical security integration. Progent's ISSAP-certified security specialists can assist your company with all phases of architecture security.

Get additional details about Progent's ISSAP Accredited Secure System Architecture Consulting Services.

CISA Professional Expertise
The CISA credential is a recognized qualification that signifies mastery in information system security audit and control. Accredited by the American National Standards Institute, the CISA accreditation has candidates undergo a comprehensive examination given by the ISACA professional group. Progent offers the expertise of a CISA-qualified security audit consultant trained to help companies in the areas of information systems audit process, IT administration, network assets and architecture planned useful life, IT service delivery, protecting information resources, and business continuity preparedness.

Get more details about Progent's Certified Information Systems Auditor (CISA) Consulting Expertise.

GIAC (Global Information Assurance Certification) Professional Services
GIAC (Global Information Assurance Certification) was established in 1999 to validate the skill of IT security experts. GIAC's mission is to assure that a certified security consultant possesses the skills appropriate to provide services in vital categories of system, information, and application security. GIAC accreditations are recognized by companies and government organizations all over the world including and the U.S. National Security Agency (NSA). Progent can provide the expertise of GIAC certified professionals for any of the network security disciplines covered within GIAC certification topics including auditing networks, security incident handling, traffic analysis, and web application security.

Find out additional details concerning Progent's GIAC Professional Expertise.

Get in Touch with Progent for Computer Security Support
If you need Mac network security support services, phone Progent at 800-993-9400 or send email to apple-help@progent.com.
















© 2002-2013 Progent Corporation. All rights reserved.