Small business networks in Arkansas can now get quick and economical online access to Progent's qualified network security experts to assist with complex security problems. Rates are affordable, charges are by the minute, sign-up is immediate, and service is world class. Progent also provides assistance for complex projects that requires the expertise of seasoned security engineers with top security credentials.

If your Arkansas company is outside of larger urban areas such as Little Rock, Fort Smith, or Fayetteville, the availability of nearby certified network security experts is often problematic when you have an emergency. This can result in a drop in productivity for your company, upset clients, idle employees, and distracted management. By contacting Progent, you have access to a qualified security professional ready to provide help whenever you require it to keep your information system running and recover your information.

Progent can assist you at any level in your efforts to protect your information system with services that can range from security assessments to developing a company-wide security plan. Progent provides economical service to assist small and midsize companies to set up and manage protected networks based on Windows and Cisco products and that may include computers running UNIX, Linux, Solaris, or Apple Mac OS X platforms as well as BYOD clients with Apple iOS iPhones and iPads or Android or Windows Phone handsets.

Progent can also show you how to outsource spam blocking and defense against e-mail-based assaults. Email Guard is Progent's email filtering and encryption platform that uses the services and infrastructure of top information security vendors to deliver centralized control and comprehensive security for your email traffic. The hybrid structure of Email Guard managed service integrates a Cloud Protection Layer with an on-premises gateway device to provide advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. Email Guard's cloud filter acts as a preliminary barricade and blocks the vast majority of threats from reaching your network firewall. This decreases your vulnerability to inbound attacks and saves system bandwidth and storage space. Email Guard's onsite security gateway appliance provides a further layer of analysis for inbound email. For outgoing email, the on-premises security gateway offers AV and anti-spam protection, DLP, and encryption. The on-premises security gateway can also help Exchange Server to track and protect internal email traffic that originates and ends within your security perimeter.

Progent's certified professionals are available online or on premises to provide a variety of emergency or longer-term IT security services which include:

If your network has an emergency need for computer security support, refer to Progent's Urgent Remote Technical Help.

Progent's engineers offer advanced support in key areas of network security that include security evaluation, firewall/VPN support, and high-level security consulting.

Security Audits
Progent's certified security consultants can evaluate the strength of your current computer protection environment by performing comprehensive remote automated analysis based on sophisticated software tools and tested techniques. Progent's experience in administering this testing saves you time and money and assures a detailed picture of system vulnerability. The information your business gains can make up the foundation of a network protection plan that can allow your information system to operate dependably and respond rapidly to future threats.

Automated Vulnerability Assessment
Progent offers expertise in the application of security analysis software such as Microsoft Baseline Security Analyzer and GFI LANguard Network Security Scanner for affordably running a set of automatic network testing checks to identify potential security vulnerabilities. Progent has broad knowledge of other security auditing products including NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, as well as utilities like SolarWinds, Netcat, Hydra, and Nikto. Progent can show you how to make sense of testing reports and respond appropriately.

Progent can help you design security into your company processes, install auditing applications, plan and deploy a protected system environment, and recommend policies to maximize the safety of your network. Progent's security professionals are ready to help you configure a firewall, design safe remote access to email and business applications, and integrate VPN. Find out additional information concerning Progent's automated security assessment.

Security Inventory Packages for Small Businesses
Progent offers two ultra-affordable security inventory bundles designed to enable small companies to receive an impartial security evaluation from a certified security engineer. With Progent's External Security Inventory Scan, a security expert runs an extensive test of your network from outside your firewalled perimeter to uncover potential weaknesses in the security profile you expose to the public. With Progent's Internal Network Security Inventory Checkup, a security expert runs a network scan from a secure machine inside your firewall to assess your exposure to inside attacks. Both security inventory services are configured and executed from a secured remote location. The project is managed by a consultant who has earned high-level security credentials and who produces a report that summarizes and interprets the data collected by the security scan and suggests practical improvements where called for.

Network Intrusion Analysis Consulting
Stealth penetration checking is an important component of any successful IT system security strategy. Progentís security experts can run extensive intrusion checks without the awareness of your organization's in-house network support staff. Unannounced penetration checking shows whether current security defense systems such as intrusion detection warnings and event history monitoring are properly configured and actively monitored. Find out more concerning Progent's network penetration testing support services.

Firewall And Virtual Private Network (VPN) Support
Progent's background in security technology encompasses extensive field work with major firewalls and VPN products from a variety of vendors such as Cisco, Microsoft, and CheckPoint. Progent offers the support of engineers with important networking certifications such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Integration and Debugging
The new Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer substantially more value than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX security appliances for all new deployments. After Cisco's acquisition of Sourcefire, the whole line of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the market's most popular network intrusion protection system. Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help your company to manage your existing PIX or Cisco ASA 5500 security appliances and migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your organization to plan, configure, optimize, administer and troubleshoot firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. See more details about Cisco ASA Firewalls with Firepower Services configuration and debugging support.

Cisco Network Security and VPN Support Services
Cisco's security and offsite connection products offer a comprehensive range of easy-to-administer security products to help protect your local and remote information system. Cisco's Virtual Private Network line features routers, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's expert staff of consultants includes field-proven specialists with Cisco's CCIE and Cisco Certified Network Professional certifications who can help your organization to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that align most closely with your company goals. Read more information about Progent's Support Services for Cisco Security Solutions and VPN Appliances.

Support Expertise for Other Firewall and VPN Technology
Progent provides small and medium size companies expert consulting for Intrusion Protection products and IPsec VPN technology from leading firewall and Virtual Private Network security vendors including Check Point Software, Juniper, and SonicWALL. Progent can show you how to design a comprehensive security plan and choose appropriate products from a variety of suppliers to achieve your security goals while sticking within your spending limits.

Progent's Flat-rate Managed Services for Information Security
Progent offers a selection of affordable, set-price monthly services intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. Managed services offered by Progent include:
Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
Email Guard is Progent's email filtering and encryption solution that incorporates the technology of leading information security vendors to deliver web-based control and world-class security for your inbound and outbound email. The powerful architecture of Progent's Email Guard managed service integrates cloud-based filtering with a local security gateway device to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne threats. The cloud filter acts as a first line of defense and blocks most threats from making it to your network firewall. This decreases your vulnerability to external attacks and saves network bandwidth and storage. Email Guard's onsite gateway appliance adds a deeper layer of inspection for inbound email. For outbound email, the onsite security gateway offers anti-virus and anti-spam filtering, DLP, and encryption. The onsite gateway can also assist Microsoft Exchange Server to track and protect internal email that originates and ends within your security perimeter. Learn more about Progent's Email Guard Spam Filtering, Virus Defense, Content Filtering and Data Leakage Prevention.

ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes cutting edge behavior-based analysis tools to guard endpoints and servers and VMs against new malware assaults such as ransomware and file-less exploits, which routinely evade legacy signature-based AV tools. ProSight Active Security Monitoring protects on-premises and cloud resources and provides a single platform to address the complete malware attack progression including blocking, identification, mitigation, remediation, and post-attack forensics. Top capabilities include single-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against new threats. Find out more about Progent's ProSight Active Security Monitoring Endpoint Protection and Ransomware Defense.

ProSight DPS: Managed Backup
ProSight Data Protection Services from Progent offer small and mid-sized organizations a low cost and fully managed service for secure backup/disaster recovery. Available at a low monthly rate, ProSight DPS automates and monitors your backup processes and allows rapid recovery of critical files, applications and VMs that have become unavailable or damaged due to component failures, software bugs, disasters, human mistakes, or malicious attacks such as ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, applications, system images, as well as Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to an on-promises device, or mirrored to both. Progent's BDR consultants can provide advanced support to configure ProSight DPS to be compliant with regulatory standards like IPPA, FINRA, PCI and Safe Harbor and, when necessary, can assist you to restore your business-critical data. Read more about ProSight DPS Managed Backup.

Certified Network Security Design
Any company should have a carefully thought out security strategy that includes both proactive procedures and reaction plans. The proactive strategy is a collection of procedures intended to minimize security weaknesses. The post-attack plan assists your security personnel to evaluate the damage caused by an attack, fix the network, document the experience, and get business functions restored as soon as feasible.

Progent's expert IT security consultants can to assist your company to perform a comprehensive risk evaluation and create a company-wide security plan to implement security policies and mechanisms to minimize ongoing attacks and threats.

CISM Certified Security Consulting Services
The CISM committee defines the core competencies and international standards of performance that IT security professionals are required to learn. CISM provides business management the confidence that consultants who have earned their CISM credential have the background and capability to deliver effective security management and consulting consulting. Progent offers the expertise of CISM qualified security consultants to assist companies with:

  • IS Security Strategies
  • Risk Analysis
  • IS Security Program Management
  • Information Security Administration
  • Response Planning
Learn more details concerning Progent's CISM Qualified IS Security Consulting Professionals.

CISSP Certified Security Engineering Support
CISSP denotes mastery of a global standard for network security. The American National Standards Institute has granted the CISSP credential accreditation in the field of information protection defined by ISO 17024. Progent offers the services of security experts who have qualified for CISSP certification. Progent can give you access to a CISSP-certified expert to help your company in a broad range of security areas such as:

  • Security Administration Procedures
  • Security Architecture and Paradigms
  • Access Management Systems and Processes
  • Software Development Security
  • Operations Security
  • Physical Security
  • Encryption/Decryption Technology
  • Telecom, Network and Internet Security
  • Disaster Recovery Planning
Read more information concerning Progent's CISSP Accredited Information Security Support Expertise.

ISSAP Certified Secure Information System Architecture Engineering Services
Progent's ISSAP qualified information system architecture engineers are consultants who have been awarded ISSAP Certification through thorough testing and extensive work with network security design. The Information System Security Architecture Professional (ISSAP) credential indicates demonstrated skill in the most complex demands of information security architecture within the broader field of IS security expertise needed for CISSP accreditation. Progent's ISSAP-certified security experts can help your company with all aspects of architecture security including.

  • Access Management Mechanisms and Methodologies
  • Telecom and Network Security
  • Encryption/Decryption Solutions
  • Needs Evaluation and Security Criteria
  • Business Continuity Planning and Disaster Recovery Planning
  • Physical Security
Learn additional information concerning Progent's ISSAP Accredited Secure System Architecture Engineering Services.

CISA Accredited IS Security Auditing Consulting Services
The Certified Information Systems Auditor credential is a recognized achievement that represents mastery in information system security audit and control. Certified by the American National Standards Institute, the CISA credential has candidates pass a comprehensive examination administered by the ISACA international professional association. Progent's CISA information security audit engineers are available to assist your IT organization in the areas of:

  • IS Audit Process
  • IT Governance
  • Network Assets and Infrastructure Planned Useful Life
  • Information Technology Support
  • Safeguarding Information Assets
  • Disaster Recovery Planning
Learn the details about Progent's CISA Qualified IS Security Auditing Engineering Services.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC certification program was established by ISACA to verify a consultant's ability to design, deploy, and support IS control mechanisms to reduce network risk. Progent offers the expertise of a CRISC-certified engineer to assist you to create and execute a workplace continuity plan based on industry best practices identified by CRISC and geared to match your company's risk appetite, business goals, and IT budget. Progent's CRISC-certified network risk mitigation engineers can provide a range of risk evaluation services including:

  • Collect data and study documentation to help identify significant vulnerabilities
  • Identify legal, industry, and business requirements and organizational standards related to your information system to assess their possible impact on your business objectives
  • Identify possible threats for your business workflows to assist in analyzing your enterprise risk
  • Create a risk awareness program and conduct training to ensure your organization understand IT risk so they can assist with your risk control program
  • Match key risk vectors to related operational procedures to help determine risk responsibility
  • Determine risk appetite with executive leadership and key stakeholders to make sure they are in agreement
Find out the details about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Qualified Security Consulting Assistance
GIAC (Global Information Assurance Certification) was established in 1999 to certify the knowledge of IT security professionals. GIAC's mission is to ensure that a certified security consultant possesses the knowledge needed to deliver services in critical areas of system, information, and program security. GIAC accreditations are recognized by companies and government organizations all over the world including and the U.S. National Security Agency (NSA). Progent's GIAC-qualified security audit consultants are available to assist your IT organization with:

  • Auditing IT Infrastructure
  • Security Incident Handling
  • Intrusion Detection
  • Web-based Application Security
  • SIEM solutions
Learn more details concerning Progent's GIAC Information Assurance Support.

Contact a Progent Security Expert
To see how to contact a certified security engineer for remote or on-premises support in Arizona, call 1-800-993-9400 or go to Online Network Help.














© 2002- 2017 Progent Corporation. All rights reserved.