Company information networks in Arkansas can now get prompt and economical online technical support from Progent's accredited security consultants to assist with complex security problems. Rates are competitive, charges are per minute, sign-up is immediate, and service is unbeatable. Progent also provides assistance for complex projects that demand the knowledge of seasoned security consultants with high-level industry certifications.

If your Arkansas office is situated far from major urban neighborhoods such as Little Rock, Fort Smith, or Fayetteville, help from nearby certified security professionals could be problematic when you have a security disaster. This can result in a loss of income for your company, upset clients, idle employees, and distracted executives. By utilizing Progent's remote support, you have access to a certified security consultant who can offer help when you need it to keep your computer network running and recover your information.

Progent can assist you in all your initiatives to guard your network with support services that ranges from security checks to creating a company-wide security plan. Progent offers affordable service to assist businesses of all sizes to design and manage secure networks based on Windows and Cisco technology and that may include servers and desktops running UNIX or Linux operating systems plus BYOD users with Apple iOS iPhones and iPads or Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam blocking and protection from e-mail-based assaults. Email Guard is Progent's email security platform that uses the services and infrastructure of top data security vendors to deliver centralized management and comprehensive protection for all your inbound and outbound email. The hybrid structure of Progent's Email Guard integrates a Cloud Protection Layer with a local security gateway device to provide complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based malware. The Cloud Protection Layer serves as a first line of defense and keeps the vast majority of threats from making it to your network firewall. This decreases your vulnerability to inbound attacks and conserves system bandwidth and storage space. ProSight Email Guard's onsite gateway appliance adds a further level of analysis for incoming email. For outbound email, the local security gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and encryption. The on-premises security gateway can also enable Microsoft Exchange Server to monitor and protect internal email traffic that originates and ends inside your corporate firewall.

Progent's security experts are accessible remotely or on site to offer a range of emergency or longer-term computer security services including:

  • Run automated network security audits
  • Recuperate promptly after serious security breaches
  • Install effective firewalls
  • Implement secure techniques for offsite and mobile connectivity
  • Deploy advanced utilities for protection against viruses, spam and directory harvest attacks
  • Help create a comprehensive security plan with round-the-clock monitoring
  • Offer outsourced Call Center Support
  • Develop a practical network backup and disaster recovery solution based on Microsoft Data Protection Manager backup capability
If your network has an emergency need for computer security support, refer to Progent's Urgent Remote Network Help.

Progent's support professionals can deliver advanced services in vital fields of network protection including auditing, firewalls and VPN, and advanced security consulting.

Security Evaluation
Progent's certified security consultants can evaluate the strength of your current network security systems through comprehensive remote automated testing based on sophisticated utilities and proven procedures. Progent's experience in this service saves your company money and assures a detailed portrayal of gaps. The knowledge your company gains can form the foundation of a security strategy that can permit your network to operate dependably and adapt rapidly to future risks.

Automated Vulnerability Audits
Progent provides expertise in the use of security testing packages including Microsoft Baseline Security Analyzer and LANguard from GFI for affordably running a set of programmed system auditing scans to uncover possible security gaps. Progent has extensive experience with other network auditing tools such as NMAP, AMAP, eEye Vulnerability Scanner, plus tools like SolarWinds, Netcat, Hydra, and Nikto. Progent can help you to make sense of testing reports and react effectively.

Progent can help you build security into your business processes, configure scanning software, plan and deploy a secure system architecture, and recommend policies to maximize the safety of your network. Progent's security engineers are able to show you how to configure a firewall, implement secure remote connectivity to email and data, and install virtual private network. Find out more on Progent's network security analysis.

Security Inventory and Evaluation Bundles for Small Businesses
Progent offers two low-cost security inventory bundles intended to enable small businesses to receive an impartial network security evaluation from an accredited security specialist. With Progent's External Network Security Inventory Scan, a security expert administers a comprehensive test of your IT infrastructure from outside your company firewall to uncover possible weaknesses in the security profile you expose to the public. With Progent's Internal Security Inventory Checkup, a certified security professional executes a network scan from a secure computer inside your firewall to uncover the risk to inside threats. The two security inventory services are configured and executed from a secured external site. The project is managed by an engineer with high-level security accreditations and who generates a document that summarizes and interprets the information collected by the security scan and suggests practical improvements if appropriate.

Network Intrusion Analysis Support Services
Stealth intrusion testing is a key part of any serious IT system security plan. Progentís security experts can run extensive penetration tests without the awareness of your company's in-house IT resources. Unannounced penetration testing uncovers whether existing security monitoring systems such as intrusion incident alerts and event log analysis are properly configured and consistently checked. Find out additional information on Progent's network security penetration analysis support services.

Firewall and Virtual Private Network Support
Progent's background in network security solutions encompasses extensive field work with leading firewalls and VPN technology offered by multiple vendors including Cisco, Microsoft, and CheckPoint. Progent offers the support of consultants who have earned important networking accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Integration and Debugging
The new Cisco ASA 5500-X Series of firewalls with Firepower Services offer significantly more value than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX 500 security appliances for all new installations. Since Cisco's purchase of Sourcefire, the entire family of ASA 5500-X devices can be configured to enable Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed intrusion protection system. Firepower services provide enhanced capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can help your company to maintain your current PIX or ASA 5500 firewalls and upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your company to design, integrate, tune, administer and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about ASA 5500-X Firewalls with Firepower Services configuration and troubleshooting services.

Cisco Security and VPN Support Expertise
Cisco's security and offsite access technology provide a full range of manageable security products to help protect your wired and wireless information system. Cisco's Virtual Private Network line features switches, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's professional consulting staff includes field-proven engineers with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional certifications who can help your organization to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that align most closely with your business goals. Learn additional details about Progent's Engineering Expertise for Cisco Security and Virtual Private Network Products.

Support Expertise for Additional Firewall and Virtual Private Network Solutions
Progent offers small and mid-size organizations professional consulting for Intrusion Protection products and IPsec VPN products from leading firewall and Virtual Private Network security vendors such as Check Point Software, Juniper Networks, and SonicWALL. Progent can show you how to create a comprehensive security strategy and choose appropriate products from multiple vendors to support your security objectives while staying within your spending restraints.

Progent's Flat-rate Managed Services for Information Security
Progent's value-priced ProSight line of managed services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance. ProSight managed services offered by Progent include:
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the infrastructure of top information security vendors to deliver web-based control and comprehensive security for all your email traffic. The hybrid structure of Email Guard integrates cloud-based filtering with an on-premises security gateway device to provide advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. Email Guard's cloud filter serves as a preliminary barricade and blocks most unwanted email from making it to your network firewall. This reduces your exposure to external attacks and conserves network bandwidth and storage space. Email Guard's onsite gateway appliance adds a deeper layer of inspection for inbound email. For outgoing email, the local security gateway provides AV and anti-spam protection, protection against data leaks, and email encryption. The onsite gateway can also assist Exchange Server to track and protect internal email that originates and ends inside your corporate firewall. For more details, see Email Guard spam and content filtering.

ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates next generation behavior machine learning technology to defend endpoint devices as well as servers and VMs against new malware assaults such as ransomware and email phishing, which routinely get by legacy signature-based AV products. ProSight ASM safeguards on-premises and cloud resources and offers a single platform to automate the complete malware attack lifecycle including blocking, identification, containment, remediation, and forensics. Top features include single-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.

ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services from Progent offer small and mid-sized businesses a low cost end-to-end service for reliable backup/disaster recovery. For a low monthly rate, ProSight Data Protection Services automates and monitors your backup processes and allows fast restoration of critical data, apps and VMs that have become unavailable or damaged due to hardware breakdowns, software bugs, natural disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, applications, system images, plus Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to an on-promises device, or mirrored to both. Progent's backup and recovery specialists can provide advanced support to set up ProSight Data Protection Services to be compliant with government and industry regulatory standards such as HIPPA, FIRPA, PCI and Safe Harbor and, whenever necessary, can help you to recover your critical data. Learn more about ProSight Data Protection Services Managed Cloud Backup and Recovery.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, update, find and safeguard information related to your network infrastructure, procedures, applications, and services. You can quickly find passwords or serial numbers and be alerted about upcoming expirations of SSL certificates ,domains or warranties. By cleaning up and organizing your IT infrastructure documentation, you can save up to 50% of time thrown away looking for critical information about your IT network. ProSight IT Asset Management features a centralized repository for holding and collaborating on all documents related to managing your business network like standard operating procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and relating IT data. Whether youíre planning improvements, performing maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the information you require the instant you need it. Learn more details about ProSight IT Asset Management service.

Expert Security Consulting
Every company ought to develop a thoroughly thought out security strategy that includes both preventive processes and reaction plans. The pre-attack strategy is a collection of procedures designed to minimize security weaknesses. The post-attack strategy assists your security personnel to assess the impact resulting from an attack, repair the system, document the event, and get business functions running as soon as possible.

Progent's expert IT security consultants are available to assist your business to run a full vulnerability assessment and create a network security plan to establish security processes and controls to mitigate future attacks and threats.

CISM Certified Information Security Support Services
The Certified Information Security Manager (CISM) committee describes the core capabilities and global standards of performance that information security professionals are expected to learn. It gives business management the assurance that consultants who have qualified for their CISM certification possess the background and capability to deliver effective security management and consulting consulting. Progent can provide the services of CISM certified security professionals to assist businesses with:

  • IS Security Processes
  • Vulnerability Management
  • IS Security Program Management
  • Network Security Administration
  • Recovery Management
Read additional information about Progent's CISM Information Security Consulting Services.

CISSP Certified Security Engineering Expertise
CISSP certification recognizes expertise with a global standard for network security. The American National Standards Institute has awarded certification recognition in the area of information security defined by ISO 17024. Progent can provide the services of security consultants who have earned CISSP certification. Progent can provide a CISSP-certified expert to help your business in a broad range of security areas including:

  • Security Management Procedures
  • Security Infrastructure and Models
  • Access Control Solutions and Methodology
  • Applications Development Security
  • Secure Operations
  • Physical Security
  • Encryption/Decryption Mechanisms
  • Telecommunications, LAN and WAN Security
  • Disaster Recovery Preparedness
Learn more details about Progent's CISSP Accredited Network Security Consulting Expertise.

ISSAP Qualified Secure IT Architecture Engineering Services
Progent's ISSAP qualified network architecture professionals are consultants who have been awarded ISSAP status as a result of thorough testing and significant work with information security design. The Information System Security Architecture Professional (ISSAP) certification indicates demonstrated mastery in the most in-depth demands of IS security architecture bounded by the wider scope of information system security knowledge needed for CISSP certification. Progent's ISSAP-certified security experts can help your business with all phases of architecture security such as.

  • Access Management Systems and Techniques
  • Telecommunications and Network Infrastructure Protection
  • Encryption/Decryption Solutions
  • Requirements Analysis and Security Guidelines
  • Business Continuity Planning and DRP
  • Site Security
Learn additional details about Progent's ISSAP Accredited Secure System Architecture Support Expertise.

CISA Qualified Network Security Auditing Consulting Services
The CISA accreditation is a globally recognized qualification that represents mastery in IS security auditing. Accredited by ANSI, the CISA accreditation requires that candidates undergo an extensive test given by the ISACA international professional group. Progent's CISA-certified information security audit experts can help your IT organization in the areas of:

  • IS Audit Process
  • IT Governance
  • Network Assets and Architecture Lifecycle
  • Information Technology Support
  • Protecting Information Resources
  • Business Continuity Preparedness
Get the details about Progent's CISA Accredited IS Security Auditing Engineering Support.

Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC certification program was established by ISACA to validate an IT professional's ability to design, implement, and support IS control mechanisms to reduce risk. Progent offers the expertise of a CRISC-certified consultant to assist you to develop and execute a workplace continuity strategy that follows leading practices identified by CRISC and geared to match your company's risk appetite, business goals, and IT budget. Progent's CRISC-qualified network risk management engineers offer a range of risk assessment services such as:

  • Gather information and study documentation to help identify major vulnerabilities
  • Inventory legal, regulatory, and business requirements and organizational standards associated with your information system to assess their potential impact on your strategic goals
  • Identify possible vulnerabilities for your operational workflows to help in evaluating your corporate risk
  • Create a risk awareness program and conduct seminars to ensure your stakeholders understand IT risk so they can contribute to your risk management process
  • Connect key risk vectors to related operational procedures to help assign risk responsibility
  • Validate risk tolerance with your senior leadership and major stakeholders to ensure they align
Get the details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Qualified Security Consulting Support
GIAC was founded in 1999 to certify the skill of network security engineers. GIAC's mission is to assure that a certified professional possesses the knowledge appropriate to deliver services in important categories of system, information, and application security. GIAC accreditations are acknowledged by companies and government organizations throughout the world including and the United States National Security Agency. Progent's GIAC-qualified network security audit specialists are available to help your company with:

  • Assessing Security Systems
  • Incident Handling
  • Traffic Analysis
  • Web-based Services Security
  • SIEM solutions
Learn additional details about Progent's GIAC Information Assurance Expertise.

Contact a Progent Security Engineer
To learn how to access a security engineer for online or onsite support in Arizona, call 1-800-993-9400 or go to Online Network Help.














© 2002- 2018 Progent Corporation. All rights reserved.