Business information networks in the state of Arkansas can now get fast and economical online access to Progent's qualified network security experts to fix the toughest security issues. The cost is competitive, billing is by the minute, sign-up is quick, and service is world class. Progent also provides help for long-term engagements that requires the knowledge of seasoned security engineers with top security certifications.
In case your Arkansas network is some distance from more populated urban areas like Little Rock, Fort Smith, or Fayetteville, help from local qualified network security consultants could be limited when there's a crisis. This can cause a loss of productivity for your business, angry clients, idle workers, and distracted management. By utilizing Progent's online services, you have access to a certified security consultant ready to provide assistance when you have to have it to get your network operating and recover your information.
Progent can assist you in your initiatives to defend your information system with services that ranges from network security audits to creating a comprehensive security plan. Progent offers economical service to assist companies of any size to configure and manage protected networks powered by Microsoft Windows and Cisco products and that may include servers and desktops based on UNIX or Linux operating systems plus BYOD users with Apple iOS iPhones and iPads or Android or Windows Phone handsets.
Progent can also assist you to outsource spam filtering and protection from email-borne attacks. Email Guard is Progent's email security platform that uses the technology of top information security companies to provide web-based control and world-class protection for your email traffic. The hybrid architecture of Email Guard combines a Cloud Protection Layer with a local gateway device to provide complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based threats. The Cloud Protection Layer serves as a first line of defense and keeps most unwanted email from reaching your security perimeter. This reduces your exposure to external threats and conserves network bandwidth and storage space. ProSight Email Guard's on-premises security gateway appliance provides a deeper level of analysis for inbound email. For outgoing email, the local gateway provides AV and anti-spam protection, DLP, and email encryption. The on-premises security gateway can also enable Exchange Server to monitor and protect internal email traffic that stays within your security perimeter.
Progent's certified consultants are available remotely or on site to offer a variety of emergency or project-based network security services which include:
If your company has an emergency need for IT security support, refer to Progent's Emergency Online Network Support.
- Perform extensive security evaluations
- Recuperate rapidly after attacks
- Install and troubleshoot firewalls
- Implement safe solutions for remote and mobile access
- Install advanced applications for automatic protection against viruses, spam and DHAs
- Develop a comprehensive security plan with proactive security monitoring
- Provide outsourced Call Center Support
- Develop a practical backup and restore plan centered on Microsoft DPM backup/restore capability
Progent's support professionals can deliver world-class support in vital facets of network protection that include auditing, firewall and VPN expertise, and high-level security planning.
Progent's expert security consultants can assess the strength of your existing computer security environment through comprehensive remote automated testing based on sophisticated utilities and proven techniques. Progent's experience in administering this service saves your company consulting fees and offers a detailed picture of weaknesses. The knowledge your business gains can form the basis of a security plan that can permit your information system to operate dependably and adapt rapidly to future threats.
Automated Vulnerability Assessment
Progent offers expertise in the use of security testing utilities such as Microsoft's MBSA and GFI LANguard for economically running a variety of automatic network testing scans to identify possible security vulnerabilities. Progent has extensive experience with additional network analysis products such as NMAP, AMAP application mapper, eEye Vulnerability Scanner, plus tools like SolarWinds, Netcat, and Nikto. Progent can show you how to make sense of testing reports and react appropriately.
Progent can show you how to design protection into your company processes, configure auditing applications, define and deploy a protected system architecture, and recommend policies to maximize the security of your IT system. Progent's security consultants are available to show you how to configure a firewall, design safe remote access to email and data, and integrate VPN. Learn additional information concerning Progent's automated security audits.
Security Inventory Scanning Packages for Small Companies
Progent offers two low-cost security inventory service bundles designed to allow small companies to get an independent security evaluation from a qualified security specialist. With Progent's External Network Security Inventory Checkup, an engineer administers a comprehensive examination of your network from outside your firewall to uncover possible risks in the security profile you expose to the public. With Progent's Internal Security Inventory Scan, a certified security professional runs a system scan from a secure computer inside your firewall to determine vulnerabilities to inside assaults. Both security inventory services are configured and executed from a secured remote location. The process is overseen by an engineer who has earned high-level security credentials and who generates a report that summarizes and analyzes the data captured by the security scan and suggests practical improvements if appropriate.
Network Security Penetration Testing Consulting
Stealth intrusion checking is an important part of any serious network security plan. Progent’s security experts can perform extensive penetration tests without the knowledge of your company's in-house IT staff. Unannounced penetration testing shows whether current security monitoring systems such as intrusion incident alerts and event log monitoring are properly configured and consistently monitored. Find out additional information concerning Progent's stealth penetration analysis consulting.
Firewall and Virtual Private Network Support
Progent's expertise in network security technology includes in-depth field work with leading firewalls and VPN products offered by a variety of companies including Cisco, Microsoft, and Juniper. Progent can provide the support of consultants with key industry certifications such as CCIE and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Configuration and Troubleshooting
The current ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer significantly more bang for the buck than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 firewalls for all new installations. Following Cisco's acquisition of Sourcefire, the whole line of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the market's most popular intrusion protection system. Firepower services provide powerful new capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-qualified CCIE network consultants can assist you to manage your legacy PIX or Cisco ASA 5500 security appliances and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your business to plan, deploy, optimize, administer and debug firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Read more information about ASA 5500-X Firewalls with Firepower integration and troubleshooting services.
Cisco Network Security and Virtual Private Network Engineering Expertise
Cisco's security and remote access technology represent a full line of easy-to-administer security solutions to help protect your local and remote information system. Cisco's Virtual Private Network product family includes routers, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's expert consulting staff includes experienced engineers with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional certifications who can help your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that fit most closely with your company goals. Read more information concerning Progent's Support Expertise for Cisco Security Solutions and VPN Products.
Consulting Services for Other Firewall and VPN Products
Progent offers small and medium size businesses expert support for Intrusion Protection Systems and IPsec VPN technology from leading firewall and Virtual Private Network security companies such as WatchGuard, Juniper Networks, and Symantec. Progent can help you design a comprehensive security strategy and choose appropriate products from multiple vendors to support your security objectives while staying within your spending limits.
Progent's Fixed-price Managed Services for Information Security
Progent's low-cost ProSight series of managed services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services offered by Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that utilizes cutting edge behavior machine learning technology to defend endpoint devices as well as physical and virtual servers against new malware attacks such as ransomware and file-less exploits, which easily evade legacy signature-matching AV tools. ProSight ASM protects local and cloud-based resources and provides a unified platform to manage the complete threat progression including blocking, detection, containment, remediation, and forensics. Key capabilities include one-click rollback with Windows Volume Shadow Copy Service and automatic network-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection managed services deliver economical multi-layer security for physical servers and VMs, workstations, mobile devices, and Microsoft Exchange. ProSight ESP utilizes adaptive security and modern behavior analysis for continuously monitoring and reacting to cyber threats from all vectors. ProSight ESP offers two-way firewall protection, intrusion alerts, endpoint management, and web filtering through cutting-edge technologies incorporated within a single agent managed from a single console. Progent's security and virtualization experts can assist your business to plan and implement a ProSight ESP deployment that addresses your organization's unique needs and that helps you prove compliance with legal and industry data security standards. Progent will assist you specify and implement policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alarms that call for immediate attention. Progent's consultants can also assist you to set up and verify a backup and disaster recovery solution such as ProSight Data Protection Services (DPS) so you can get back in business quickly from a potentially disastrous cyber attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Microsoft Exchange email filtering.
ProSight DPS: Managed Backup
ProSight Data Protection Services from Progent offer small and mid-sized organizations an affordable and fully managed service for secure backup/disaster recovery. Available at a fixed monthly price, ProSight Data Protection Services automates your backup activities and allows rapid restoration of vital data, apps and VMs that have become unavailable or damaged due to component breakdowns, software bugs, disasters, human error, or malware attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images/, as well as Hyper-V and VMware virtual machine images/. Important data can be backed up on the cloud, to an on-promises device, or mirrored to both. Progent's BDR consultants can provide world-class expertise to configure ProSight Data Protection Services to be compliant with regulatory standards like HIPPA, FINRA, and PCI and, whenever necessary, can assist you to restore your business-critical information. Read more about ProSight DPS Managed Cloud Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that uses the infrastructure of top information security vendors to deliver web-based control and comprehensive protection for all your inbound and outbound email. The powerful architecture of Progent's Email Guard managed service integrates cloud-based filtering with a local security gateway appliance to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based malware. The Cloud Protection Layer serves as a first line of defense and blocks the vast majority of threats from reaching your security perimeter. This decreases your exposure to external attacks and conserves system bandwidth and storage. Email Guard's onsite security gateway device provides a further layer of inspection for incoming email. For outbound email, the local gateway offers AV and anti-spam filtering, DLP, and email encryption. The on-premises security gateway can also help Exchange Server to monitor and safeguard internal email that stays inside your corporate firewall. For more information, visit Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its critical servers and applications hosted in a secure fault tolerant data center on a high-performance virtual host set up and maintained by Progent's IT support professionals. Under Progent's ProSight Virtual Hosting model, the client retains ownership of the data, the OS software, and the applications. Since the system is virtualized, it can be ported easily to an alternate hardware solution without a time-consuming and technically risky reinstallation procedure. With ProSight Virtual Hosting, your business is not tied a single hosting service. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, retrieve and protect data related to your IT infrastructure, procedures, business apps, and services. You can quickly locate passwords or IP addresses and be alerted about impending expirations of SSL certificates ,domains or warranties. By updating and organizing your network documentation, you can save up to 50% of time wasted searching for vital information about your network. ProSight IT Asset Management features a common repository for holding and collaborating on all documents required for managing your business network such as standard operating procedures and How-To's. ProSight IT Asset Management also supports advanced automation for collecting and relating IT data. Whether you’re planning enhancements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the information you need the instant you need it. Find out more details about Progent's ProSight IT Asset Management service.
Expert Network Security Planning
Every company should have a carefully considered security program that incorporates both preventive processes and reaction plans. The pre-attack strategy is a collection of mechanisms designed to minimize vulnerabilities. The reactive strategy helps your IT security engineers to evaluate the damage caused by an attack, fix the system, document the experience, and get business functions running as soon as feasible.
Progent's expert information security engineers can to assist your company to perform a full risk assessment and define a network security strategy to implement security processes and mechanisms to minimize future attacks and dangers.
CISM Qualified Information Security Support Expertise
The Certified Information Security Manager (CISM) committee describes the core capabilities and international standards of performance that information security professionals are required to learn. It gives executive management the assurance that those who have qualified for their CISM credential possess the experience and knowledge to deliver effective security management and consulting consulting. Progent offers the services of CISM qualified security professionals to help companies with:
Learn more details about Progent's CISM Accredited IS Security Engineering Expertise.
- IS Security Processes
- Vulnerability Management
- Network Security Program Management
- Network Security Management
- Recovery Management
CISSP Certified Security Consulting Support
CISSP certification denotes expertise with a global standard for network security. The American National Standards Institute has granted the CISSP credential accreditation in the area of information security stipulated by ISO 17024. Progent can provide access to of security consultants who have earned CISSP certification. Progent can provide a CISSP-certified consultant to help your enterprise in a variety security fields such as:
Learn more details about Progent's CISSP Security Consulting Services.
- Security Administration Practices
- Security Infrastructure and Paradigms
- Access Control Solutions and Processes
- Software Development Security
- Operations Security
- Physical Security
- Encryption/Decryption Technology
- Telecom, LAN and WAN Security
- Disaster Recovery Planning
CISSP-ISSAP Accredited Secure System Architecture Consulting Services
Progent's CISSP-ISSAP certified system architecture engineers are experts who have earned ISSAP Certification through rigorous examination and extensive experience with network security design. The Information System Security Architecture Professional (ISSAP) credential indicates demonstrated competence in the most complex requirements of information system security architecture bounded by the wider scope of information security expertise required for CISSP accreditation. Progent's ISSAP-certified security consultants can assist your company with all aspects of architecture security including.
Read additional information about Progent's ISSAP Qualified Secure IT Architecture Consulting Services.
- Access Control Systems and Methodologies
- Phone System and Network Infrastructure Protection
- Encryption/Decryption Solutions
- Requirements Analysis and Security Criteria
- BCP and Disaster Recovery Planning
- Physical Security
CISA Certified Security Auditing Engineering Expertise
The Certified Information Systems Auditor credential is an important achievement that represents mastery in network security audit and control. Certified by the American National Standards Institute, the CISA accreditation requires that candidates undergo an extensive test given by the ISACA professional group. Progent's CISA-qualified network security audit experts can help your IT organization with:
Find out more details about Progent's CISA Qualified IS Security Auditing Consulting Services.
- IS Audit Process
- IT Governance
- Network Assets and Infrastructure Lifecycle
- Information Technology Service Delivery
- Protecting Information Resources
- Disaster Recovery Preparedness
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to validate a consultant's skills to plan, deploy, and support IS control mechanisms to reduce risk. Progent offers the expertise of a CRISC-certified consultant to help your company to develop and carry out a business continuity strategy based on industry best practices promoted by CRISC and geared to align with your organization's risk tolerance, business objectives, and IT budget. Progent's CRISC-qualified IT risk management specialists can provide a variety of risk assessment services including:
Get more information about Progent's CRISC Risk Management Experts.
- Collect data and study documentation to help identify major vulnerabilities
- Identify legal, regulatory, and contractual mandates and organizational standards associated with your network to assess their possible influence on your business goals
- Point out potential threats for your business workflows to assist in evaluating your corporate risk
- Develop a risk awareness program and provide training to ensure your organization understand IT risk so they can assist with your risk control program
- Connect key risk scenarios to related business procedures to help assign risk responsibility
- Determine risk appetite with your senior management and major stakeholders to ensure they are in agreement
GIAC Accredited IS Security Engineering Expertise
Find out additional details concerning Progent's GIAC Information Assurance Expertise.
GIAC was founded in 1999 to validate the skill of IT security experts. GIAC's mission is to make sure that an accredited security consultant possesses the knowledge appropriate to deliver services in key areas of system, data, and application security. GIAC certifications are acknowledged by companies and government organizations around the world including and the U.S. NSA. Progent's GIAC-certified information security audit experts are available to help your company in the areas of:
Get in Touch with a Certified Progent Security Expert
To see how you can get in touch with a certified Progent security engineer for online or onsite help in Arizona, call 1-800-993-9400 or visit Online Computer Help.