Small business IT networks in the state of California now have quick and affordable online technical support from Progent's certified network security support specialists to fix critical security issues. Rates are affordable, billing is per minute, sign-up is quick, and service is world class. Progent also offers assistance for complex projects that demand the knowledge of senior security consultants with top security certifications.
In case your California small business is situated outside of major urban areas such as Los Angeles, San Diego, San Jose, San Francisco, Long Beach, Fresno, or Sacramento, access to nearby accredited security engineers could be limited when you have an urgent situation. This can cause lost revenue for your company, upset clients, unproductive workers, and defocused executives. By utilizing Progent, you can get in touch with a certified security professional ready to deliver assistance whenever you have to have it to keep your information system running and recover your information.
Progent can assist you in a variety of ways in your initiatives to defend your network with services that can range from security checks to creating a comprehensive security strategy. Progent offers affordable support to help small and midsize companies to design and manage safe IT environments powered by Microsoft Windows and Cisco products and that may include servers and desktops running UNIX or Linux platforms as well as mobile users with Apple iOS handhelds or Google Android or Windows Phone handsets.
Progent can also assist you to outsource spam filtering and protection from email-borne assaults. Email Guard is Progent's email security solution that uses the technology of top information security vendors to provide centralized management and comprehensive protection for your email traffic. The hybrid structure of Progent's Email Guard managed service combines cloud-based filtering with an on-premises security gateway appliance to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne threats. The Cloud Protection Layer serves as a first line of defense and keeps the vast majority of unwanted email from reaching your security perimeter. This reduces your exposure to inbound threats and conserves network bandwidth and storage. ProSight Email Guard's onsite gateway device provides a deeper level of analysis for inbound email. For outbound email, the onsite gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The local security gateway can also help Exchange Server to monitor and protect internal email traffic that originates and ends inside your security perimeter.
Progent's security experts are available online or on site to offer a variety of urgent or project-based IT security services which include:
If your network has an immediate requirement for IT security support, refer to Progent's Urgent Online Network Support.
- Perform thorough network security evaluations
- Recover promptly after virus and worm attacks
- Install effective firewalls
- Configure safe methods for remote and mobile connectivity
- Install advanced software for automatic protection against spam and directory harvest attacks
- Develop a company-wide security plan with 24x7 network monitoring
- Provide comprehensive Call Center Services
- Develop an effective data backup and restore plan centered on Microsoft DPM backup/restore technology
Progent's consultants offer advanced services in key fields of computer protection that include analysis, firewall and VPN solutions, and high-level security consulting.
System Security Evaluation
Progent's expert security consultants can assess the vulnerability of your existing computer security environment through comprehensive remote automated analysis via sophisticated utilities and proven techniques. Progent's skill in this service saves you consulting fees and assures an accurate portrayal of security holes. The knowledge your company is provided can make up the basis of a network protection plan that will allow your network to run safely and respond rapidly to future risks.
Automated Vulnerability Audits
Progent provides expertise in the application of security auditing products including Microsoft Baseline Security Analyzer and GFI LANguard Network Security Scanner for affordably running a set of programmed system testing checks to identify potential security problems. Progent has broad experience with additional security auditing tools including NMAP, AMAP application mapper, eEye Vulnerability Scanner, as well as utilities like Metasploit Framework, Netcat, Socat, and Nikto. Progent can help you to understand audit reports and react appropriately.
Progent can show you how to design security into your company operations, install scanning tools, define and deploy a secure network environment, and suggest policies to maximize the security of your IT system. Progent's security engineers are available to show you how to configure a firewall, implement secure remote access to email and business applications, and integrate virtual private network. Find out additional information on Progent's network security analysis.
Security Inventory Service Packages for Small Companies
Progent has put together two ultra-affordable security inventory bundles designed to enable small businesses to get an objective security assessment from a qualified security consultant. With Progent's External Security Inventory Scan, an engineer runs a comprehensive test of your IT infrastructure from beyond your company firewall to determine potential weaknesses in the security posture you expose to the public. With Progent's Internal Security Inventory Scan, a security engineer runs a network scan from an authorized computer inside your company firewall to determine the risk to internal assaults. Both security inventory packages are set up and executed from a protected external site. The process is directed by an engineer with high-level security accreditations and who generates a report that details and analyzes the information captured by the security scan and proposes practical remediation where called for.
Network Penetration Testing Support Services
Stealth penetration testing is a key component of any successful network security strategy. Progentís security experts can run extensive penetration checks without the knowledge of your company's in-house IT resources. Stealth penetration checking shows whether existing security defense systems such as intrusion detection alerts and event history analysis are properly configured and consistently monitored. Find out additional information concerning Progent's network security penetration testing consulting.
Progent's background in network security technology includes extensive field work with major firewalls and Virtual Private Network technology offered by a variety of vendors such as Cisco, Microsoft, and Juniper. Progent can provide the services of consultants who have earned important networking accreditations such as Cisco Certified Internetwork Expert and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Debugging
The new ASA 5500-X Family of firewalls with Firepower Services deliver substantially more value than Cisco's previous firewalls and have replaced the ASA 5500 and PIX 500 security appliances for new installations. Since Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed network intrusion protection system. Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can assist you to maintain your legacy PIX or ASA 5500 firewalls and migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your organization to design, deploy, optimize, manage and troubleshoot firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Find out more information about Cisco ASA 5500-X Firewalls with Firepower Services integration and debugging services.
Cisco Security and VPN Consulting Services
Cisco's security and offsite access products provide a comprehensive range of manageable security products to help protect your local and remote information system. Cisco's Virtual Private Network line includes switches, firewalls, intrusion detection systems and VPN appliances. Progent's expert staff of consultants includes field-proven specialists with Cisco's CCIE and CCNP certifications who can assist your business to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that align most closely with your company objectives. Learn additional details about Progent's Support Expertise for Cisco Security and Virtual Private Network Products.
Consulting Services for Additional Firewall and VPN Products
Progent provides small and mid-size companies expert consulting for Intrusion Protection products and IPsec VPN solutions from leading firewall and Virtual Private Network security companies such as Check Point Software, Juniper, and SonicWALL. Progent can show you how to design a comprehensive security plan and choose appropriate products from multiple vendors to support your security objectives while staying within your budget restraints.
Progent's Flat-rate Managed Services for Information Assurance
Progent's low-cost ProSight family of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection service that incorporates next generation behavior-based machine learning tools to guard endpoint devices as well as physical and virtual servers against new malware attacks like ransomware and email phishing, which routinely evade traditional signature-matching anti-virus products. ProSight Active Security Monitoring protects local and cloud resources and provides a single platform to manage the complete malware attack progression including blocking, identification, mitigation, cleanup, and post-attack forensics. Top features include one-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection managed services deliver economical in-depth protection for physical servers and VMs, desktops, smartphones, and Microsoft Exchange. ProSight ESP utilizes contextual security and advanced machine learning for round-the-clock monitoring and reacting to cyber threats from all vectors. ProSight ESP delivers two-way firewall protection, penetration alerts, device management, and web filtering via cutting-edge tools packaged within a single agent accessible from a single control. Progent's data protection and virtualization consultants can help you to plan and implement a ProSight ESP deployment that meets your company's specific requirements and that helps you demonstrate compliance with government and industry information protection regulations. Progent will help you specify and implement security policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alerts that call for immediate action. Progent's consultants can also assist your company to set up and test a backup and restore solution such as ProSight Data Protection Services (DPS) so you can get back in business rapidly from a destructive security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Exchange email filtering.
ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services from Progent provide small and mid-sized businesses an affordable end-to-end solution for secure backup/disaster recovery. Available at a fixed monthly rate, ProSight DPS automates your backup processes and allows rapid restoration of critical files, apps and virtual machines that have become lost or damaged due to hardware breakdowns, software bugs, natural disasters, human error, or malware attacks such as ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, apps, system images/, plus Microsoft Hyper-V and VMware virtual machine images/. Critical data can be backed up on the cloud, to an on-promises storage device, or to both. Progent's BDR specialists can deliver advanced support to configure ProSight Data Protection Services to to comply with government and industry regulatory requirements like HIPPA, FIRPA, and PCI and, when necessary, can help you to recover your critical information. Learn more about ProSight Data Protection Services Managed Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the technology of leading data security vendors to provide web-based management and comprehensive security for your email traffic. The powerful structure of Progent's Email Guard integrates a Cloud Protection Layer with a local security gateway device to offer advanced defense against spam, viruses, Dos Attacks, DHAs, and other email-borne threats. Email Guard's cloud filter acts as a first line of defense and blocks the vast majority of unwanted email from reaching your network firewall. This reduces your exposure to inbound attacks and conserves system bandwidth and storage space. Email Guard's on-premises gateway appliance adds a deeper level of analysis for incoming email. For outbound email, the on-premises security gateway provides anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The on-premises gateway can also help Microsoft Exchange Server to track and safeguard internal email that originates and ends inside your security perimeter. For more details, visit Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small business can have its critical servers and applications hosted in a protected Tier III data center on a fast virtual machine host set up and maintained by Progent's network support experts. Under the ProSight Virtual Hosting service model, the client retains ownership of the data, the OS platforms, and the apps. Since the environment is virtualized, it can be ported easily to an alternate hardware environment without requiring a lengthy and difficult reinstallation process. With ProSight Virtual Hosting, your business is not locked into one hosting service. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, maintain, find and safeguard data related to your IT infrastructure, processes, business apps, and services. You can quickly locate passwords or serial numbers and be warned automatically about upcoming expirations of SSLs or warranties. By updating and managing your network documentation, you can eliminate up to half of time spent searching for critical information about your IT network. ProSight IT Asset Management features a common repository for holding and collaborating on all documents related to managing your business network like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers advanced automation for collecting and associating IT information. Whether youíre making enhancements, performing regular maintenance, or responding to a crisis, ProSight IT Asset Management delivers the knowledge you require when you need it. Learn more details about ProSight IT Asset Management service.
Certified Security Design
Every business ought to develop a thoroughly thought out security strategy that includes both preventive procedures and response plans. The proactive strategy is a collection of procedures that help to minimize security weaknesses. The post-attack strategy assists your company's network security personnel to assess the impact caused by a security penetration, repair the damage, document the experience, and get the IT network operational as quickly as feasible.
Progent's expert IS security consultants can to assist your business to run a complete vulnerability evaluation and define a computer security strategy to implement security policies and controls to reduce future attacks and dangers.
CISM Qualified Information Security Support Services
The Certified Information Security Manager (CISM) committee defines the basic capabilities and worldwide standards of skill that information security managers are expected to master. It gives executive management the assurance that consultants who have earned their CISM certification possess the background and capability to provide effective security administration and consulting services. Progent offers the support of CISM qualified security consultants to help businesses with:
Learn more details about Progent's CISM Certified Security Consulting Services.
- Network Security Governance
- Risk Management
- Network Security Program Management
- Network Security Administration
- Recovery Management
CISSP Accredited Security Engineering Services
CISSP certification denotes expertise with a global standard for information security. ANSI (American National Standards Institute) has awarded certification accreditation in the field of data security defined by ISO/IEC 17024. Progent can provide the services of security experts who have earned CISSP certification. Progent can provide a CISSP-certified consultant to help your business in a broad range of security areas such as:
Find out additional details about Progent's CISSP-certified Cybersecurity Consulting Professionals.
- Security Administration Procedures
- Security Infrastructure and Paradigms
- Access Management Solutions and Processes
- Applications Development Security
- Operations Security
- Site Security
- Data Encryption Technology
- Telecom, LAN and Internet Security
- Business Continuity Preparedness
CISSP-ISSAP Accredited Secure IT Architecture Consulting Services
Progent's CISSP-ISSAP qualified information system architecture professionals are consultants who have been awarded ISSAP status as a result of thorough examination and significant experience with information security architecture. The ISSAP certification indicates demonstrated mastery in the more complex demands of IS security architecture bounded by the broader field of information system security expertise needed for CISSP accreditation. Progent's ISSAP-certified security experts can assist your business with all aspects of secure network architecture including.
Read additional details concerning Progent's ISSAP Accredited Secure IT Architecture Support Expertise.
- Access Control Systems and Methodologies
- Telecom and System Infrastructure Security
- Data Encryption Options
- Requirements Evaluation and Security Guidelines
- Business Continuity Planning (BCP) and Disaster Recovery Planning
- Hardware Security
CISA Qualified Security Auditing Consulting Services
The Certified Information Systems Auditor (CISA) accreditation is a globally recognized achievement that signifies mastery in information system security auditing. Certified by the American National Standards Institute, the CISA accreditation requires that consultants undergo an extensive test administered by the ISACA international professional association. Progent's CISA-qualified security audit experts can help your business in the areas of:
Read more information about Progent's CISA Accredited Information System Security Auditing Consulting Support.
- IS Audit Services
- Information Technology Administration
- Systems and Infrastructure Planned Useful Life
- IT Service Delivery
- Protecting Information Resources
- Business Continuity Preparedness
The CRISC program was established by ISACA to validate a consultant's skills to design, deploy, and support IS controls to mitigate risk. Progent can provide the services of a CRISC-certified engineer to assist you to create and execute a workplace continuity or disaster recovery plan based on leading practices promoted by CRISC and crafted to align with your company's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC-qualified network risk management specialists can provide a range of risk evaluation services such as:
Learn the details concerning Progent's CRISC Risk Management Consultants.
- Collect information and review documentation to identify major vulnerabilities
- Inventory legal, industry, and business requirements and company standards related to your network to assess their possible influence on your strategic objectives
- Point out possible vulnerabilities for your business workflows to help in analyzing your corporate risk
- Create a risk awareness initiative and provide training to make sure your organization appreciate IS risk so they can contribute to your risk control process
- Connect key risk scenarios to related business processes to help assign risk responsibility
- Determine risk tolerance with your senior management and major stakeholders to ensure they are in agreement
GIAC Certified Network Security Engineering Assistance
Global Information Assurance Certification was founded in 1999 to validate the skill of IT security professionals. GIAC's goal is to assure that an accredited security consultant has the knowledge needed to deliver services in vital areas of network, information, and application program security. GIAC certifications are recognized by companies and government organizations around the world including and the United States National Security Agency. Progent's GIAC information security audit engineers are available to assist your business with:
Read additional details about Progent's GIAC Information Assurance Expertise.
- Assessing IT Infrastructure
- Incident Handling
- Traffic Analysis
- Web Services Security
- SIEM solutions
Talk to a Progent Security Specialist
To see how to access a Progent security engineer for online or onsite support in California, phone 1-800-993-9400 or go to Remote Computer Support.
© 2002-2019 Progent Corporation. All rights reserved.