Company information networks in the state of New Mexico can depend on prompt and affordable online technical support from Progent's accredited security engineers to help with complex security issues. Rates are competitive, billing is per minute, engagement is immediate, and support is unbeatable. Progent also provides help for complex projects that demand the knowledge of senior security consultants with top industry credentials.
If your New Mexico company is situated away from more populated urban neighborhoods including Albuquerque, Las Cruces, Santa Fe, or Rio Rancho, contact with local accredited network security engineers may be problematic when you have a security disaster. This can result in a loss of revenue for your business, angry customers, idle employees, and defocused executives. By contacting Progent's online services, you can get in touch with a certified security professional ready to offer expertise whenever you require it to get your network running and recover your data.
Progent can help you in a variety of ways in your efforts to defend your network with support ranging from security audits to creating a company-wide security plan. Progent offers affordable support to help companies of any size to set up and manage safe networks powered by Microsoft Windows and Cisco products and that can include servers and desktops based on UNIX or Linux operating systems plus mobile users with Apple iOS handhelds or Google Android or Windows Phone smart phones and tablets.
Progent can also help you outsource spam filtering and defense against e-mail-based assaults. Email Guard is Progent's email filtering and encryption solution that incorporates the technology of top information security vendors to deliver web-based management and world-class protection for all your inbound and outbound email. The hybrid architecture of Progent's Email Guard integrates a Cloud Protection Layer with an on-premises gateway appliance to offer complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne malware. The Cloud Protection Layer acts as a first line of defense and keeps the vast majority of unwanted email from reaching your network firewall. This reduces your exposure to inbound threats and saves system bandwidth and storage space. ProSight Email Guard's on-premises security gateway device provides a further layer of inspection for inbound email. For outgoing email, the local gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and encryption. The on-premises gateway can also enable Microsoft Exchange Server to monitor and safeguard internal email traffic that stays within your corporate firewall.
Progent's certified professionals are available online or in person to offer a variety of urgent or project-based network security services which include:
If your company has an urgent need for IT security support, go to Progent's Emergency Remote Network Help.
Progent's support professionals provide advanced support in key facets of computer security that include auditing, firewall and VPN expertise, and high-level security consulting.
System Security Assessment
Progent's expert security engineers can evaluate the strength of your existing network security systems through comprehensive remote automated testing based on sophisticated software tools and tested techniques. Progent's skill in this service saves your company time and money and assures an accurate portrayal of security holes. The information your company gains can form the basis of a network protection strategy that can allow your network to operate safely and react rapidly to future threats.
Automated Vulnerability Evaluation
Progent provides expertise in the application of security evaluation utilities including MBSA and GFI LANguard for economically performing a variety of automatic network testing scans to identify potential security weaknesses. Progent has extensive knowledge of other security analysis tools including NMAP, AMAP application mapper, eEye, as well as tools like Metasploit, Netcat, Socat, and Nikto. Progent can show you how to make sense of audit reports and react appropriately.
Progent can help you build protection into your company operations, configure auditing tools, plan and deploy a protected system environment, and recommend policies to optimize the security of your network. Progent's security engineers are ready to assist you to configure a firewall, design safe remote access to email and data, and install VPN. Find out more concerning Progent's network security audits.
Security Inventory Service Bundles for Small Companies
Progent offers two ultra-affordable security inventory service packages designed to enable small businesses to receive a professional network security assessment from a qualified security expert. With Progent's External Security Inventory Scan, an engineer administers an extensive examination of your network from beyond your firewall to determine possible weaknesses in the security posture you expose to the outside world. With Progent's Internal Security Inventory Scan, a security engineer executes a network scan from an authorized machine within your company firewall to assess vulnerabilities to internal assaults. The two security inventory services are configured and executed from a protected remote site. The project is overseen by an engineer with top security accreditations and who generates a report that summarizes and interprets the data collected by the scan and suggests practical remediation where called for.
Network Intrusion Testing Consulting
Stealth penetration checking is an important component of any serious network security plan. Progentís security professionals can run extensive penetration tests without the knowledge of your organization's internal IT staff. Unannounced penetration testing shows whether existing security monitoring tools such as intrusion incident warnings and event log analysis are properly set up and actively monitored. Learn more on Progent's stealth penetration testing support services.
Progent's expertise in network security solutions encompasses in-depth familiarity with leading firewalls and Virtual Private Network (VPN) technology offered by multiple vendors such as Cisco, Microsoft, and CheckPoint. Progent offers the support of engineers who have earned important industry accreditations including CCIE and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Integration and Troubleshooting
The current ASA 5500-X Series of firewalls with Firepower Services provide significantly more bang for the buck than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new installations. Since Cisco's purchase of Sourcefire, the whole line of ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort product, which is the world's most popular intrusion protection system (IPS). Firepower services bring enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help you to manage your legacy PIX or Cisco ASA 5500 firewalls and upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your business to design, integrate, tune, manage and troubleshoot firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about Cisco ASA Firewalls with Firepower configuration and debugging support.
Cisco Security and VPN Support Services
Cisco's security and remote access technology provide a complete range of manageable security products to help protect your wired and wireless information system. Cisco's VPN line features switches, firewalls, intrusion detection systems and VPN concentrators. Progent's professional staff of consultants includes experienced specialists with Cisco's CCIE and CCNP certifications who can help your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that fit best with your business goals. Learn more information about Progent's Consulting Services for Cisco Security Solutions and VPN Products.
Engineering Services for Additional Firewall and VPN Products
Progent provides small and mid-size businesses professional consulting for Intrusion Protection Systems and IPsec VPN products from leading firewall and VPN security vendors including WatchGuard, Juniper Networks, and Symantec. Progent can show you how to create a comprehensive security strategy and select the right technologies from a variety of vendors to support your security goals while staying within your budget limits.
Progent's Flat-rate Managed Services for Information Security
Progent's low-cost ProSight line of outsourced network management services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) service that incorporates cutting edge behavior machine learning technology to guard endpoints and servers and VMs against new malware attacks like ransomware and file-less exploits, which easily get by legacy signature-matching AV tools. ProSight Active Security Monitoring safeguards local and cloud resources and provides a single platform to manage the complete threat lifecycle including filtering, detection, containment, remediation, and forensics. Key features include one-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against new threats. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection (ESP) services deliver economical multi-layer security for physical servers and virtual machines, workstations, mobile devices, and Microsoft Exchange. ProSight ESP utilizes contextual security and advanced machine learning for round-the-clock monitoring and reacting to cyber assaults from all vectors. ProSight ESP delivers firewall protection, intrusion alarms, endpoint control, and web filtering via leading-edge tools packaged within a single agent accessible from a unified control. Progent's security and virtualization consultants can help your business to design and implement a ProSight ESP deployment that meets your company's specific needs and that allows you prove compliance with legal and industry information security standards. Progent will assist you define and configure policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alerts that call for immediate action. Progent can also help you to set up and verify a backup and restore system such as ProSight Data Protection Services so you can recover quickly from a destructive security attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified endpoint security and Microsoft Exchange email filtering.
ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services offer small and medium-sized businesses a low cost end-to-end solution for secure backup/disaster recovery. Available at a fixed monthly price, ProSight DPS automates your backup activities and enables fast restoration of critical files, apps and virtual machines that have become lost or damaged due to hardware failures, software bugs, disasters, human mistakes, or malware attacks such as ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, apps, system images/, plus Microsoft Hyper-V and VMware images/. Critical data can be backed up on the cloud, to an on-promises device, or to both. Progent's backup and recovery specialists can deliver advanced support to set up ProSight DPS to to comply with government and industry regulatory standards such as HIPPA, FIRPA, and PCI and, whenever necessary, can help you to restore your business-critical data. Read more about ProSight Data Protection Services Managed Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the infrastructure of leading information security vendors to deliver centralized control and world-class security for your inbound and outbound email. The hybrid structure of Email Guard managed service combines a Cloud Protection Layer with a local security gateway appliance to provide complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. Email Guard's cloud filter acts as a first line of defense and blocks the vast majority of threats from making it to your network firewall. This reduces your exposure to inbound threats and conserves system bandwidth and storage space. Email Guard's onsite gateway device adds a further level of inspection for incoming email. For outbound email, the onsite security gateway offers anti-virus and anti-spam filtering, DLP, and email encryption. The onsite security gateway can also help Microsoft Exchange Server to monitor and safeguard internal email that originates and ends inside your corporate firewall. For more details, see Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its key servers and applications hosted in a protected Tier III data center on a high-performance virtual host set up and managed by Progent's IT support professionals. Under the ProSight Virtual Hosting service model, the customer owns the data, the OS software, and the applications. Since the environment is virtualized, it can be ported easily to an alternate hardware environment without a time-consuming and technically risky reinstallation procedure. With ProSight Virtual Hosting, you are not tied one hosting provider. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, maintain, find and safeguard information about your IT infrastructure, processes, applications, and services. You can quickly locate passwords or serial numbers and be warned automatically about upcoming expirations of SSLs or domains. By cleaning up and managing your IT documentation, you can save up to 50% of time wasted looking for vital information about your IT network. ProSight IT Asset Management features a centralized location for storing and collaborating on all documents required for managing your network infrastructure such as standard operating procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and associating IT information. Whether youíre making enhancements, performing regular maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the data you need the instant you need it. Find out more details about Progent's ProSight IT Asset Management service.
Certified Network Security Design
Any business should have a carefully considered security strategy that includes both pre-attack procedures and reaction plans. The pre-attack strategy is a collection of procedures intended to reduce vulnerabilities. The reactive plan assists your network security personnel to evaluate the impact resulting from an attack, fix the network, record the event, and get the IT network operational as rapidly as possible.
Progent's expert IT security engineers can to assist your business to run a full risk assessment and create a network security plan to implement security processes and controls to reduce future attacks and threats.
CISM Qualified Network Security Support Services
The Certified Information Security Manager (CISM) committee describes the basic capabilities and international standards of performance that information security professionals are required to learn. CISM gives executive management the confidence that those who have earned their CISM certification possess the background and knowledge to provide efficient security management and support consulting. Progent offers the services of CISM qualified security consultants to assist companies with:
Read additional details concerning Progent's CISM Qualified Network Security Support Services.
- IS Security Strategies
- Risk Management
- Information Security Implementation Management
- IS Security Management
- Response Planning
CISSP Accredited Security Engineering Expertise
The CISSP credential recognizes expertise with a global standard for information security. The American National Standards Institute has granted certification recognition in the field of data protection stipulated by ISO/IEC 17024. Progent can provide the services of security experts who have qualified for CISSP accreditation. Progent can provide a CISSP-certified professional to help your enterprise in a broad range of security areas such as:
Learn additional information about Progent's CISSP Accredited Information Security Support Professionals.
- Security Management Practices
- Security Infrastructure and Paradigms
- Access Control Solutions and Processes
- Software Development Security
- Operations Security
- Site Security
- Encryption/Decryption Mechanisms
- Telecommunications, Network and WAN Security
- Business Continuity Planning
CISSP-ISSAP Accredited Secure System Architecture Engineering Assistance
Progent's CISSP-ISSAP certified system architecture professionals are experts who have been awarded ISSAP Certification as a result of thorough examination and extensive experience with network security architecture. The ISSAP certification represents proven skill in the most complex demands of IS security architecture within the broader field of information system security knowledge needed for CISSP accreditation. Progent's ISSAP-certified security consultants can assist your business with all aspects of architecture security including.
Read additional information concerning Progent's ISSAP Accredited Secure IT Architecture Consulting Expertise.
- Access Management Systems and Methodologies
- Phone System and Network Infrastructure Protection
- Encryption/Decryption Solutions
- Requirements Evaluation and Security Criteria
- Business Continuity Planning and Disaster Recovery Planning
- Hardware Security
CISA Accredited Security Auditing Engineering Support
The CISA credential is a prestigious achievement that indicates mastery in IS security audit and control. Accredited by ANSI, the CISA accreditation has candidates undergo a comprehensive examination given by the ISACA international professional association. Progent's CISA-certified network security audit consultants are available to help your business with:
Find out more information about Progent's CISA Qualified Security Auditing Engineering Services.
- IS Audit Services
- IT Enforcement
- Network Assets and Infrastructure Planned Useful Life
- Information Technology Service Delivery
- Protecting Data Assets
- Business Continuity Planning
The CRISC certification program was established by ISACA to verify an IT professional's skills to design, deploy, and maintain information system control mechanisms to reduce risk. Progent offers the expertise of a CRISC-certified consultant to assist you to develop and execute a workplace continuity or disaster recovery strategy that follows leading practices identified by CRISC and geared to match your organization's risk appetite, business objectives, and IT budget. Progent's CRISC-certified network risk mitigation consultants offer a variety of risk evaluation services such as:
Get additional details concerning Progent's CRISC Risk Management Experts.
- Collect data and study documentation to identify significant vulnerabilities
- Inventory statutory, industry, and contractual mandates and organizational policies related to your information system to determine their possible impact on your strategic goals
- Identify possible threats for your operational processes to assist in evaluating your enterprise risk
- Create a risk awareness program and provide seminars to ensure your organization understand information system risk so they can assist with your risk management process
- Connect key risk vectors to your associated operational processes to help determine risk ownership
- Determine risk tolerance with executive leadership and major stakeholders to ensure they align
GIAC Qualified Information System Security Consulting Expertise
GIAC (Global Information Assurance Certification) was established in 1999 to certify the knowledge of information technology security experts. GIAC's goal is to make sure that an accredited professional has the skills needed to deliver support in vital areas of network, data, and application software security. GIAC certifications are recognized by businesses and institutions around the world including and the U.S. National Security Agency (NSA). Progent's GIAC network security audit engineers can help your company with:
Read additional details concerning Progent's GIAC Information Assurance Services.
- Assessing Security Systems
- Security Incident Response
- Intrusion Detection
- Web Services Security
- SIEM solutions
Contact a Certified Progent Security Engineer
To see how you can contact a certified security consultant for remote or on-premises assistance in New Mexico, call 1-800-993-9400 or go to Online Computer Support.
© 2002-2019 Progent Corporation. All rights reserved.