Small business IT networks in the state of California can have fast and affordable online access to Progent's accredited network security professionals to resolve critical security issues. The cost is affordable, charges are per minute, engagement is immediate, and service is unbeatable. Progent also provides help for long-term engagements that demand the expertise of seasoned security engineers with high-level industry certifications.
If your California small business is located far from more populated urban neighborhoods such as Los Angeles, San Diego, San Jose, San Francisco, Long Beach, Fresno, or Sacramento, the availability of nearby accredited security professionals may be limited when you have an urgent situation. This can result in a loss of revenue for your business, upset customers, idle workers, and defocused management. By utilizing Progent, you have access to a certified security consultant ready to provide expertise when you need it to keep your information system on line and salvage your data.
Progent can assist you in your efforts to protect your IT environment with support services that ranges from network security audits to developing a comprehensive security plan. Progent provides economical support to help companies of any size to design and maintain protected networks powered by Windows and Cisco products and that may include computers running UNIX or Linux platforms as well as mobile clients with Apple handhelds or Android or Windows Phone smart phones and tablets.
Progent can also show you how to outsource spam blocking and protection from e-mail-based attacks. Email Guard is Progent's email security platform that incorporates the technology of leading information security companies to provide centralized control and world-class protection for all your inbound and outbound email. The hybrid structure of Progent's Email Guard integrates cloud-based filtering with an on-premises security gateway device to provide advanced defense against spam, viruses, Dos Attacks, DHAs, and other email-based threats. ProSight Email Guard's cloud filter acts as a first line of defense and keeps the vast majority of threats from reaching your security perimeter. This reduces your vulnerability to inbound attacks and conserves network bandwidth and storage. ProSight Email Guard's onsite security gateway device provides a further level of inspection for incoming email. For outgoing email, the on-premises security gateway offers AV and anti-spam filtering, protection against data leaks, and email encryption. The onsite security gateway can also enable Exchange Server to track and safeguard internal email traffic that originates and ends inside your corporate firewall.
Progent's certified professionals are available remotely or on premises to offer a range of urgent or project-based IT security services such as:
If your company has an emergency need for computer security support, go to Progent's Urgent Online Network Support.
- Run thorough security audits
- Recover rapidly after serious security breaches
- Install firewalls from multiple vendors
- Implement safe methods for remote and mobile connectivity
- Deploy effective solutions for defense against spam and DHAs
- Develop a comprehensive security strategy with proactive monitoring
- Offer outsourced Call Center Services
- Help Create a practical network backup and restore solution centered on Data Protection Manager (DPM) backup capability
Progent's engineers offer world-class support in key areas of computer protection including analysis, firewall/VPN support, and high-level security planning.
System Security Assessment
Progent's expert security engineers can assess the vulnerability of your existing network security implementation through comprehensive remote automated analysis via sophisticated software tools and tested techniques. Progent's experience in administering this service saves you money and offers a detailed portrayal of weaknesses. The knowledge your business gains can make up the foundation of a network protection plan that can permit your information system to operate safely and react rapidly to new threats.
Automated Security Evaluation
Progent provides consulting in the application of security auditing software including Microsoft's MBSA and GFI LANguard for affordably running a set of programmed system testing scans to identify potential security weaknesses. Progent has extensive knowledge of additional network auditing tools such as NMAP, AMAP application mapper, eEye, as well as utilities like SolarWinds, Netcat, Hydra, and Nikto. Progent can help you to make sense of testing reports and respond effectively.
Progent can show you how to design protection into your business processes, configure auditing tools, plan and implement a secure system architecture, and recommend procedures to maximize the safety of your network. Progent's security professionals are ready to show you how to set up a firewall, implement secure remote connectivity to email and business applications, and install virtual private network. Learn additional information on Progent's automated security evaluation.
Security Inventory Packages for Small Businesses
Progent offers two ultra-affordable security inventory scanning bundles intended to allow small businesses to receive an independent network security evaluation from a qualified security engineer. With Progent's External Network Security Inventory Checkup, an engineer runs a comprehensive examination of your network from beyond your company firewall to determine possible risks in the security posture you present to the public. With Progent's Internal Network Security Inventory Checkup, a security engineer executes a system scan from an authorized machine inside your company firewall to determine the risk to inside assaults. Both security inventory packages are configured and run from a protected remote location. The project is overseen by an engineer who has earned top security credentials and who generates a document that summarizes and analyzes the data collected by the security scan and suggests practical improvements if called for.
Stealth Penetration Testing Support Services
Stealth penetration testing is an important component of any serious network security plan. Progentís security experts can run extensive penetration checks without the knowledge of your company's in-house network support resources. Unannounced penetration checking uncovers whether existing security monitoring systems such as intrusion incident warnings and event log monitoring are correctly set up and actively checked. Find out additional information on Progent's stealth security penetration analysis consulting.
Firewall and Virtual Private Network Expertise
Progent's expertise in network security technology includes extensive field work with leading firewalls and VPN products from multiple companies including Cisco, Microsoft, and Symantec. Progent can provide the support of consultants with key networking certifications including CCIE and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Configuration and Troubleshooting
Progent's Flat-rate Managed Services for Information Security
The latest generation of ASA 5500-X Series of firewalls with Firepower Services offer substantially more value than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX security appliances for new installations. Following Cisco's purchase of Sourcefire, the entire family of Cisco ASA 5500-X devices can be configured to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed network intrusion protection system. Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help your company to manage your current PIX or ASA 5500 firewalls and migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your company to design, integrate, tune, manage and debug firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Learn more details about ASA Firewalls with Firepower configuration and debugging services.
Cisco Security and Virtual Private Network Engineering Expertise
Cisco's security and offsite connection products represent a complete line of manageable security solutions to help safeguard your wired and wireless information system. Cisco's VPN product family includes routers, firewalls, intrusion detection devices and VPN concentrators. Progent's professional staff of consultants includes experienced specialists with Cisco Certified Internetwork Expert and Cisco Certified Network Professional certifications who can help your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that align best with your company goals. Read additional details concerning Progent's Support Expertise for Cisco Security Solutions and VPN Appliances.
Engineering Expertise for Other Firewall and VPN Products
Progent offers small and medium size organizations professional support for Intrusion Protection products and IPsec VPN products from major firewall and Virtual Private Network security vendors including Check Point Software, Juniper, and SonicWALL. Progent can show you how to create a detailed security strategy and select the right products from multiple suppliers to support your security goals while staying within your spending limits.
Progent's value-priced ProSight line of outsourced network management services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Certified Security Design
ProSight Active Security Monitoring is an endpoint protection service that incorporates next generation behavior analysis tools to guard endpoints and servers and VMs against new malware attacks like ransomware and email phishing, which routinely get by traditional signature-based AV tools. ProSight ASM protects local and cloud-based resources and offers a unified platform to automate the entire malware attack lifecycle including filtering, detection, containment, remediation, and post-attack forensics. Key capabilities include single-click rollback using Windows Volume Shadow Copy Service and automatic network-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
ProSight Enhanced Security Protection (ESP) managed services offer economical multi-layer security for physical servers and virtual machines, workstations, mobile devices, and Exchange Server. ProSight ESP uses adaptive security and advanced heuristics for round-the-clock monitoring and reacting to security assaults from all attack vectors. ProSight ESP delivers firewall protection, intrusion alarms, device control, and web filtering through leading-edge technologies incorporated within a single agent accessible from a unified control. Progent's security and virtualization experts can assist you to plan and configure a ProSight ESP deployment that addresses your company's specific needs and that helps you prove compliance with government and industry data security regulations. Progent will help you specify and implement policies that ProSight ESP will enforce, and Progent will monitor your network and react to alarms that call for immediate action. Progent can also assist you to install and verify a backup and disaster recovery system like ProSight Data Protection Services so you can get back in business rapidly from a potentially disastrous cyber attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange filtering.
ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services from Progent offer small and medium-sized businesses a low cost end-to-end service for secure backup/disaster recovery (BDR). Available at a low monthly rate, ProSight DPS automates your backup processes and enables fast recovery of critical files, apps and virtual machines that have become lost or corrupted due to hardware breakdowns, software glitches, natural disasters, human mistakes, or malicious attacks such as ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, applications, system images/, as well as Hyper-V and VMware images/. Important data can be protected on the cloud, to a local storage device, or mirrored to both. Progent's BDR specialists can provide advanced support to configure ProSight DPS to be compliant with government and industry regulatory standards such as HIPPA, FIRPA, and PCI and, when necessary, can assist you to recover your critical information. Read more about ProSight DPS Managed Cloud Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the technology of top information security vendors to deliver centralized management and world-class protection for your inbound and outbound email. The powerful architecture of Progent's Email Guard integrates cloud-based filtering with a local security gateway appliance to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The cloud filter acts as a first line of defense and keeps the vast majority of unwanted email from making it to your security perimeter. This reduces your vulnerability to inbound threats and conserves system bandwidth and storage space. Email Guard's on-premises security gateway device provides a deeper layer of analysis for incoming email. For outbound email, the onsite gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The local security gateway can also help Microsoft Exchange Server to monitor and safeguard internal email traffic that originates and ends within your security perimeter. For more details, visit ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small business can have its critical servers and applications hosted in a secure Tier III data center on a high-performance virtual host set up and maintained by Progent's network support professionals. Under Progent's ProSight Virtual Hosting service model, the client owns the data, the OS software, and the applications. Because the environment is virtualized, it can be ported easily to a different hosting environment without a time-consuming and technically risky reinstallation procedure. With ProSight Virtual Hosting, you are not locked into one hosting service. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, maintain, find and protect data related to your IT infrastructure, processes, business apps, and services. You can quickly locate passwords or IP addresses and be warned about upcoming expirations of SSLs or warranties. By updating and organizing your IT documentation, you can eliminate as much as half of time wasted trying to find critical information about your IT network. ProSight IT Asset Management features a centralized location for holding and collaborating on all documents related to managing your business network like standard operating procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for collecting and relating IT information. Whether youíre planning improvements, performing regular maintenance, or responding to a crisis, ProSight IT Asset Management delivers the knowledge you need as soon as you need it. Find out more about ProSight IT Asset Management service.
Every company should develop a thoroughly considered security program that incorporates both proactive procedures and reaction planning. The proactive strategy is a set of steps designed to reduce security weaknesses. The post-attack plan helps your network security engineers to assess the damage caused by a security penetration, fix the damage, document the event, and get the IT network operational as quickly as feasible.
Progent's certified information security consultants can to help your company to run a full vulnerability evaluation and create a computer security strategy to establish security policies and mechanisms to mitigate future attacks and threats.
CISM Accredited System Security Consulting Services
The CISM committee describes the core capabilities and international standards of skill that information security managers are expected to master. CISM provides executive management the confidence that consultants who have qualified for their CISM certification possess the experience and knowledge to provide efficient security management and consulting services. Progent offers the support of CISM qualified security consultants to help businesses with:
Learn additional information about Progent's CISM Qualified IS Security Engineering Expertise.
- Information Security Governance
- Vulnerability Analysis
- IS Security Program Management
- IS Security Administration
- Recovery Management
CISSP Certified Security Engineering Assistance
CISSP recognizes mastery of a global standard for data security. ANSI (American National Standards Institute) has awarded certification recognition in the area of information protection stipulated by ISO 17024. Progent offers the services of security professionals who have qualified for CISSP certification. Progent can provide a CISSP-certified professional to help your organization in a variety security areas such as:
Learn more details concerning Progent's CISSP Qualified Information Security Support Expertise.
- Security Management Procedures
- Security Architecture and Paradigms
- Access Control Solutions and Methodology
- Software Development Security
- Secure Operations
- Site Security
- Encryption/Decryption Mechanisms
- Telecom, LAN and WAN Security
- Business Continuity Planning
CISSP-ISSAP Accredited Secure IT Architecture Engineering Services
Progent's CISSP-ISSAP qualified system architecture engineers are experts who have been awarded ISSAP status as a result of rigorous examination and extensive work with information security architecture. The Information System Security Architecture Professional (ISSAP) certification represents demonstrated mastery in the most in-depth requirements of IS security architecture within the wider field of information security knowledge needed for CISSP certification. Progent's ISSAP-qualified security consultants can help your company with all aspects of secure network architecture such as.
Learn additional information about Progent's ISSAP Qualified Secure Information System Architecture Consulting Services.
- Access Control Mechanisms and Methodologies
- Phone System and Network Security
- Data Encryption Options
- Needs Analysis and Security Guidelines
- BCP and DRP
- Site Security
CISA Accredited Network Security Auditing Consulting Support
The CISA credential is a globally recognized qualification that signifies mastery in network security auditing. Accredited by the American National Standards Institute (ANSI), the CISA credential has candidates undergo a comprehensive test given by the ISACA professional group. Progent's CISA network security audit engineers are available to assist your IT organization with:
Read the details concerning Progent's CISA Certified IS Security Auditing Engineering Support.
- IS Audit Process
- Information Technology Governance
- Systems and Infrastructure Planned Useful Life
- Information Technology Service Delivery
- Protecting Data Assets
- Business Continuity Preparedness
Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC program was established by ISACA to validate an IT professional's skills to design, implement, and support IS controls to reduce network risk. Progent can provide the services of a CRISC-certified engineer to assist you to develop and execute a business continuity or disaster recovery plan based on leading practices identified by CRISC and crafted to align with your company's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC network risk management experts offer a range of risk assessment services including:
Learn more details about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Collect information and review documentation to help identify significant risk scenarios
- Identify statutory, industry, and business requirements and organizational policies related to your network to determine their possible influence on your strategic goals
- Identify possible threats for your operational workflows to assist in evaluating your corporate risk
- Develop a risk awareness initiative and conduct training to make sure your organization understand IS risk so they can assist with your risk control program
- Match identified risk vectors to related operational processes to help determine risk ownership
- Validate risk appetite with executive management and major stakeholders to ensure they match
GIAC Certified Network Security Consulting Expertise
GIAC was founded in 1999 to validate the skill of network security professionals. GIAC's mission is to verify that a certified professional has the skills needed to provide support in vital areas of system, data, and application software security. GIAC accreditations are recognized by businesses and institutions around the world including and the United States National Security Agency. Progent's GIAC-certified IS security audit consultants are available to assist your business in the areas of:
Read additional details about Progent's GIAC Information Assurance Expertise.
- Auditing IT Infrastructure
- Security Incident Handling
- Intrusion Detection
- Web-based Services Security
- SIEM solutions
Talk to a Security Specialist
To see how you can contact a Progent security consultant for remote or onsite help in California, call 1-800-993-9400 or go to Remote Computer Support.