Small business IT networks in the state of Arkansas now have prompt and affordable online technical support from Progent's qualified network security experts to help with critical security problems. The cost is affordable, billing is by the minute, sign-up is quick, and service is world class. Progent also offers help for long-term engagements that requires the expertise of senior security consultants with high-level security certifications.

In case your Arkansas organization is some distance from major metropolitan neighborhoods like Little Rock, Fort Smith, or Fayetteville, help from local qualified security engineers may be limited when you have an emergency. This could mean a loss of income for your company, angry customers, idle workers, and distracted management. By utilizing Progent's online services, you have access to a certified security professional ready to provide help whenever you need it to get your network operating and salvage your information.

Progent can assist you in a variety of ways in your efforts to protect your IT environment with services that ranges from security audits to creating a comprehensive security strategy. Progent offers economical support to assist small and midsize companies to design and manage safe IT environments based on Windows and Cisco Systems technology and that may include servers and desktops running UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus BYOD clients with Apple iOS iPhones and iPads or Android or Windows Phone smart phones and tablets.

Progent can also show you how to outsource spam filtering and defense against email-borne security threats. Email Guard is Progent's email security solution that uses the services and infrastructure of top information security companies to deliver web-based management and world-class security for your email traffic. The powerful structure of Progent's Email Guard combines a Cloud Protection Layer with an on-premises security gateway appliance to provide complete protection against spam, viruses, Denial of Service Attacks (DoAs), Directory Harvest Attacks, and other email-based malware. Email Guard's Cloud Protection Layer acts as a first line of defense and keeps the vast majority of threats from making it to your network firewall. This decreases your exposure to inbound attacks and saves network bandwidth and storage space. Email Guard's on-premises gateway device adds a further layer of analysis for inbound email. For outbound email, the local security gateway provides anti-virus and anti-spam filtering, DLP, and email encryption. The local security gateway can also assist Exchange Server to track and protect internal email traffic that originates and ends within your corporate firewall.

Progent's certified professionals are accessible online or on premises to offer a range of emergency or longer-term network security services including:

If your business has an urgent need for computer security support, refer to Progent's Emergency Online Network Support.

Progent's consultants provide advanced support in key fields of system security that include analysis, firewall and VPN solutions, and high-level security consulting.

System Audits
Progent's expert security consultants can evaluate the effectiveness of your existing computer security environment through comprehensive remote automated testing via sophisticated utilities and proven procedures. Progent's experience in this service saves you consulting fees and offers a detailed portrayal of system vulnerability. The information your company is provided can be used as the basis of a security plan that will allow your information system to operate dependably and react quickly to future risks.

Automated Network Vulnerability Evaluation
Progent offers expertise in the application of security auditing software such as MBSA and GFI LANguard Network Security Scanner for affordably performing a variety of programmed network auditing scans to uncover potential security gaps. Progent has broad knowledge of other security analysis products including NMAP Port Scanner, AMAP Application Scanner, eEye, plus tools such as Metasploit Framework, Netcat, Socat, and Nikto. Progent can show you how to make sense of audit reports and react appropriately.

Progent can show you how to build security into your company processes, configure scanning tools, plan and implement a secure network environment, and suggest procedures to optimize the safety of your IT system. Progent's security engineers are able to assist you to set up a firewall, design safe remote access to email and business applications, and integrate virtual private network. Find out additional information concerning Progent's automated security evaluation.

Security Inventory and Evaluation Bundles for Small Businesses
Progent has put together two ultra-affordable security inventory scanning bundles intended to enable small companies to get a professional network security assessment from a qualified security specialist. With Progent's External Network Security Inventory Scan, a security expert administers a comprehensive examination of your network from outside your company firewall to uncover possible weaknesses in the security posture you expose to the public. With Progent's Internal Security Inventory Checkup, a certified security professional executes a network scan from a secure computer within your firewall to evaluate the risk to internal threats. Both security inventory services are set up and executed from a secured remote location. The project is overseen by a consultant with high-level security accreditations and who generates a report that summarizes and analyzes the information collected by the scan and proposes practical remediation if appropriate.

Network Intrusion Analysis Consulting
Stealth penetration testing is an important component of any successful IT system security plan. Progentís security professionals can perform thorough penetration checks without the awareness of your company's internal IT staff. Stealth penetration checking shows whether current security defense tools such as intrusion incident warnings and event log analysis are properly configured and consistently checked. Learn additional information about Progent's stealth security penetration analysis consulting.

Firewalls and VPN Solutions
Progent's expertise in security solutions encompasses in-depth familiarity with major firewalls and Virtual Private Network (VPN) technology offered by multiple companies including Cisco, Microsoft, and Juniper. Progent can provide the support of consultants with key networking certifications including Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.

Cisco Firewalls Support Services
Progentís experienced Cisco network security consulting professionals offer high-level PIX Firewall and ASA Firewall consulting services including infrastructure design, integration, and support of Cisco firewall and Cisco security solutions. The ASA Series and discontinued PIX series of Cisco firewalls deliver robust user and application software policy management, multivector attack defense, and secure access services. Ranging from economical, plug-and-play desktop appliances for small businesses to scalable gigabit appliances, Cisco PIX and ASA Firewalls offer a high level of protection, performance, and excellent reliability for network environments of any size. PIX Firewalls and ASA Firewalls are based on a proven, specially designed operating system, minimizing possible OS-specific security holes. Learn additional information about Progent's Cisco PIX and ASA Firewalls Consulting Services.

Cisco Network Security and VPN Engineering Services
Cisco's security and remote access technology offer a full range of manageable security solutions to help protect your wired and wireless information system. Cisco's VPN line features routers, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's expert consulting staff includes experienced engineers with Cisco's CCIE and CCNP certifications who are able to assist your business to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that align best with your company objectives. Find out additional details about Progent's Consulting Expertise for Cisco Security and Virtual Private Network Appliances.

Support Expertise for Other Firewall and Virtual Private Network Solutions
Progent offers small and medium size businesses expert consulting for Intrusion Protection products and IPSec VPN solutions from leading firewall and Virtual Private Network security vendors including Check Point Software, Juniper Networks, and Symantec. Progent can help you design a comprehensive security strategy and choose appropriate technologies from a variety of suppliers to support your security objectives while sticking within your budget restraints.

Expert Security Design
Any business should develop a thoroughly thought out security strategy that includes both preventive processes and response planning. The pre-attack plan is a collection of mechanisms designed to minimize security weaknesses. The reactive plan helps your company's network security personnel to evaluate the impact caused by a security penetration, repair the network, document the experience, and get the IT network operational as soon as possible.

Progent's expert information security engineers are available to help your business to perform a comprehensive risk assessment and create a network security strategy to establish security processes and mechanisms to mitigate ongoing attacks and threats.

CISM Certified Security Support Assistance
The CISM organization describes the basic capabilities and global standards of performance that IT security professionals are required to master. It provides executive management the assurance that those who have earned their CISM certification have the background and knowledge to provide effective security management and consulting services. Progent offers the support of CISM qualified security professionals to help companies with:

  • Information Security Processes
  • Vulnerability Analysis
  • Network Security Program Management
  • IS Security Administration
  • Response Management
Find out more details concerning Progent's CISM Certified Information Security Support Expertise.

CISSP Certified Security Consulting Expertise
CISSP certification denotes expertise with a global standard for information security. The American National Standards Institute has awarded certification recognition in the area of data protection stipulated by ISO 17024. Progent can provide access to of security experts who have earned CISSP certification. Progent can give you access to a CISSP-certified consultant to help your enterprise in a variety security fields including:

  • Security Administration Procedures
  • Security Infrastructure and Models
  • Access Management Solutions and Processes
  • Applications Development Security
  • Operations Security
  • Site Security
  • Encryption/Decryption Technology
  • Telecommunications, LAN and Internet Security
  • Business Continuity Preparedness
Learn more information concerning Progent's CISSP-certified Security Engineering Expertise.

ISSAP Qualified Secure System Architecture Consulting Support
Progent's ISSAP qualified network architecture professionals are experts who have earned ISSAP Certification through rigorous testing and significant work with information security architecture. The ISSAP certification represents proven mastery in the more challenging requirements of information system security architecture bounded by the broader scope of information system security expertise needed for CISSP accreditation. Progent's ISSAP-certified security consultants can assist your company with all phases of secure network architecture including.

  • Access Control Mechanisms and Techniques
  • Telecommunications and System Infrastructure Security
  • Cryptography Options
  • Requirements Analysis and Security Criteria
  • BCP and Disaster Recovery Planning
  • Site Security
Read additional information about Progent's ISSAP Qualified Secure Network Architecture Consulting Services.

CISA Qualified Information System Security Auditing Engineering Services
The Certified Information Systems Auditor accreditation is a globally recognized achievement that represents mastery in IS security audit and control. Accredited by the American National Standards Institute, the CISA accreditation has consultants undergo a comprehensive test given by the ISACA professional group. Progent's CISA information security audit engineers can help your company in the areas of:

  • IS Audit Process
  • Information Technology Enforcement
  • Network Assets and Architecture Lifecycle Planning
  • Information Technology Service Delivery
  • Safeguarding Information Assets
  • Business Continuity Planning
Read additional information about Progent's CISA Accredited Network Security Auditing Consulting Support.

Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA in 2010 to verify an IT professional's ability to plan, deploy, and support information system controls to mitigate network risk. Progent offers the services of a CRISC-certified consultant to assist your company to develop and execute a workplace continuity or disaster recovery plan that follows leading practices promoted by CRISC and geared to align with your company's risk tolerance, business goals, and IT budget. Progent's CRISC network risk mitigation specialists offer a variety of risk identification services such as:

  • Collect information and study documentation to identify significant vulnerabilities
  • Inventory legal, regulatory, and business requirements and organizational standards related to your network to assess their possible influence on your business objectives
  • Point out possible threats for your business processes to assist in evaluating your enterprise risk
  • Create a risk awareness initiative and conduct training to make sure your organization appreciate IT risk so they can contribute to your risk management process
  • Match identified risk vectors to your associated business procedures to help assign risk ownership
  • Determine risk appetite with your senior leadership and key stakeholders to make sure they match
Read more details concerning Progent's CRISC Consultants.

GIAC Qualified Network Security Consulting Expertise
GIAC was founded in 1999 to validate the skill of network security experts. GIAC's mission is to assure that an accredited security consultant possesses the knowledge necessary to deliver support in critical categories of network, data, and application software security. GIAC accreditations are recognized by companies and government organizations all over the world including and the United States NSA. Progent's GIAC-qualified IS security audit consultants can help your IT organization in the areas of:

  • Assessing Networks
  • Security Incident Response
  • Intrusion Detection
  • Web-based Services Security
Learn more information concerning Progent's GIAC IS Security Consulting Assistance.

Contact a Progent Security Engineer
To find out how to access a certified Progent security consultant for online or on-premises support in Arizona, phone 1-800-993-9400 or go to Remote Computer Support.














© 2002-2016 Progent Corporation. All rights reserved.