Business computer networks in Oklahoma now have prompt and affordable online help from Progent's accredited network security professionals to help with the toughest security issues. Rates are competitive, billing is by the minute, sign-up is fast, and support is world class. Progent also offers assistance for long-term projects that requires the services of senior security consultants with high-level security certifications.
In case your Oklahoma business is based far from larger metropolitan areas like Oklahoma City, Tulsa, Norman, or Lawton, access to nearby qualified network security professionals could be limited during a crisis. This can cause a loss of income for your company, upset customers, idle employees, and distracted management. By contacting Progent's remote support, you can get in touch with a certified security consultant who can offer assistance whenever you need it to get your network operating and salvage your data.
Progent can help you in your initiatives to protect your IT environment with support ranging from security checks to creating a company-wide security plan. Progent provides economical service to help companies of any size to set up and manage secure networks powered by Windows and Cisco technology and that may include computers running UNIX, Linux, Solaris, or Apple Mac OS X platforms plus mobile clients with Apple iOS iPhones and iPads or Google Android or Windows Phone devices.
Progent can also show you how to outsource spam blocking and defense against e-mail-based assaults. Email Guard is Progent's email security platform that incorporates the technology of leading information security vendors to provide web-based management and world-class protection for all your email traffic. The powerful structure of Progent's Email Guard managed service combines a Cloud Protection Layer with an on-premises gateway device to offer advanced defense against spam, viruses, Dos Attacks, DHAs, and other email-borne malware. The cloud filter acts as a first line of defense and blocks most threats from making it to your security perimeter. This reduces your vulnerability to external attacks and saves system bandwidth and storage. ProSight Email Guard's onsite gateway device adds a further layer of inspection for inbound email. For outgoing email, the on-premises gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also enable Exchange Server to track and safeguard internal email traffic that stays within your corporate firewall.
Progent's certified consultants are accessible online or on premises to offer a range of emergency or project-based IT security services such as:
If your company has an immediate requirement for computer security help, go to Progent's Urgent Remote Technical Help.
Progent's security experts offer world-class services in vital areas of network security that include analysis, firewall and VPN solutions, and advanced security planning.
Progent's certified security engineers can evaluate the effectiveness of your existing computer security environment through exhaustive remote automated analysis via sophisticated utilities and tested techniques. Progent's skill in administering this testing saves your company money and offers an accurate picture of system vulnerability. The information your business is provided can form the basis of a network protection plan that will permit your network to operate dependably and react rapidly to new risks.
Automated Security Analysis
Progent offers consulting in the application of security analysis utilities including MBSA and GFI LANguard Network Security Scanner for affordably running a variety of programmed system testing checks to uncover possible security holes. Progent has extensive knowledge of additional network analysis utilities such as NMAP, AMAP application mapper, eEye, plus tools such as SolarWinds, Hydra, and Nikto. Progent can show you how to understand testing reports and react effectively.
Progent can help you build security into your company processes, install auditing tools, define and deploy a secure network architecture, and suggest policies to optimize the security of your IT system. Progent's security professionals are able to help you set up a firewall, design safe remote access to email and business applications, and integrate virtual private network. Find out additional information concerning Progent's automated security audits.
Security Inventory Service Packages for Small Businesses
Progent offers two low-cost security inventory scanning packages designed to allow small businesses to get an objective security evaluation from a qualified security expert. With Progent's External Network Security Inventory Scan, a security expert runs a comprehensive test of your network from beyond your company firewall to uncover potential weaknesses in the security posture you expose to the outside world. With Progent's Internal Security Inventory Scan, an engineer executes a network scan from a secure computer within your firewall to evaluate the risk to internal threats. Both security inventory packages are set up and run from a secured remote site. The project is directed by an engineer who has earned top security credentials and who produces a document that summarizes and analyzes the data captured by the scan and suggests cost-effective remediation where appropriate.
Network Security Penetration Analysis Consulting
Stealth intrusion testing is an important component of any comprehensive IT system security plan. Progent’s security experts can run thorough penetration checks without the awareness of your company's internal network support resources. Unannounced penetration checking uncovers whether current security defense systems such as intrusion incident alerts and event log analysis are properly configured and actively checked. Learn additional information on Progent's stealth penetration testing support services.
Firewall And Virtual Private Network (VPN) Solutions
Progent's expertise in security solutions includes in-depth familiarity with leading firewalls and Virtual Private Network products offered by a variety of vendors including Cisco, Microsoft, and Juniper. Progent can provide the support of engineers who have earned key networking certifications such as CCIE and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Configuration and Troubleshooting
Progent's Fixed-price Managed Services for Information Assurance
The new Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer significantly more value than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 security appliances for new installations. After Cisco's acquisition of Sourcefire, the whole line of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed network intrusion protection system (IPS). Firepower services bring enhanced features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can help you to maintain your current PIX or Cisco ASA 5500 security appliances or upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your organization to design, deploy, tune, manage and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. See additional details about ASA 5500-X Firewalls with Firepower integration and debugging services.
Cisco Network Security and VPN Consulting Expertise
Cisco's security and offsite connection technology represent a complete range of manageable security solutions to help safeguard your wired and wireless information system. Cisco's Virtual Private Network line includes routers, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's expert staff of consultants includes field-proven specialists with Cisco Certified Internetwork Expert and Cisco Certified Network Professional certifications who can assist your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that fit most closely with your company objectives. Read additional information concerning Progent's Support Services for Cisco Security Technology and VPN Products.
Engineering Expertise for Other Firewall and Virtual Private Network Technology
Progent offers small and medium size companies professional support for Intrusion Protection Systems and IPsec VPN products from major firewall and Virtual Private Network security companies including Check Point Software, Juniper, and Symantec. Progent can help you design a comprehensive security strategy and select appropriate products from a variety of suppliers to achieve your security objectives while sticking within your spending restraints.
Progent's value-priced ProSight line of managed services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Expert Network Security Design
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes cutting edge behavior-based analysis technology to guard endpoint devices and physical and virtual servers against modern malware attacks such as ransomware and file-less exploits, which easily get by legacy signature-matching anti-virus tools. ProSight Active Security Monitoring protects on-premises and cloud-based resources and offers a single platform to automate the complete threat progression including protection, detection, containment, cleanup, and post-attack forensics. Key capabilities include one-click rollback with Windows Volume Shadow Copy Service and automatic network-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Endpoint Security
ProSight Enhanced Security Protection (ESP) managed services offer economical in-depth protection for physical servers and VMs, desktops, mobile devices, and Exchange Server. ProSight ESP utilizes adaptive security and advanced heuristics for continuously monitoring and reacting to cyber assaults from all attack vectors. ProSight ESP delivers two-way firewall protection, penetration alerts, endpoint management, and web filtering through leading-edge technologies packaged within a single agent accessible from a unified console. Progent's data protection and virtualization consultants can assist your business to plan and implement a ProSight ESP deployment that meets your organization's unique requirements and that allows you prove compliance with legal and industry information protection regulations. Progent will help you define and implement security policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alerts that require urgent action. Progent's consultants can also assist your company to install and test a backup and disaster recovery solution such as ProSight Data Protection Services (DPS) so you can recover quickly from a destructive cyber attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Exchange email filtering.
ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services from Progent offer small and mid-sized organizations a low cost end-to-end solution for secure backup/disaster recovery. For a fixed monthly rate, ProSight DPS automates your backup activities and enables fast restoration of vital data, apps and virtual machines that have become lost or corrupted due to component breakdowns, software bugs, natural disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, applications, system images/, as well as Microsoft Hyper-V and VMware images/. Critical data can be protected on the cloud, to an on-promises device, or mirrored to both. Progent's BDR specialists can deliver world-class support to set up ProSight Data Protection Services to to comply with regulatory requirements like HIPPA, FIRPA, PCI and Safe Harbor and, when needed, can help you to restore your business-critical data. Read more about ProSight DPS Managed Cloud Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that uses the infrastructure of top data security vendors to deliver web-based control and comprehensive security for all your email traffic. The powerful structure of Email Guard managed service combines a Cloud Protection Layer with an on-premises security gateway device to provide advanced defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-based threats. The Cloud Protection Layer acts as a preliminary barricade and keeps the vast majority of threats from reaching your network firewall. This decreases your vulnerability to inbound attacks and conserves system bandwidth and storage space. Email Guard's on-premises security gateway device adds a deeper level of inspection for inbound email. For outbound email, the onsite gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The local gateway can also help Exchange Server to monitor and protect internal email traffic that originates and ends within your corporate firewall. For more details, visit Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a protected Tier III data center on a fast virtual machine host configured and managed by Progent's IT support professionals. Under the ProSight Virtual Hosting service model, the customer retains ownership of the data, the operating system software, and the apps. Since the system is virtualized, it can be moved easily to a different hardware environment without a time-consuming and difficult configuration procedure. With ProSight Virtual Hosting, you are not locked into a single hosting provider. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, retrieve and safeguard data about your IT infrastructure, processes, business apps, and services. You can quickly find passwords or IP addresses and be alerted about upcoming expirations of SSLs or domains. By cleaning up and managing your IT infrastructure documentation, you can save as much as half of time thrown away searching for critical information about your network. ProSight IT Asset Management features a centralized location for holding and sharing all documents required for managing your network infrastructure like standard operating procedures and How-To's. ProSight IT Asset Management also supports advanced automation for collecting and associating IT information. Whether you’re planning enhancements, performing regular maintenance, or responding to a crisis, ProSight IT Asset Management delivers the information you require the instant you need it. Find out more about ProSight IT Asset Management service.
Every business ought to have a carefully considered security strategy that includes both preventive procedures and response planning. The pre-attack plan is a set of procedures designed to reduce vulnerabilities. The reactive strategy helps your IT security engineers to assess the impact resulting from a security penetration, repair the damage, record the event, and get business functions running as quickly as feasible.
Progent's certified IS security engineers can to help you to perform a comprehensive risk assessment and define a network security plan to implement security policies and controls to reduce ongoing attacks and threats.
CISM Qualified Information Security Support Assistance
The Certified Information Security Manager (CISM) committee describes the core competencies and global standards of skill that IT security professionals are expected to learn. CISM provides executive management the confidence that those who have earned their CISM certification have the background and knowledge to provide effective security administration and consulting consulting. Progent can provide the services of CISM certified security consultants to assist companies with:
Read more details about Progent's CISM Certified Security Support Professionals.
- IS Security Governance
- Vulnerability Management
- Information Security Implementation Management
- Network Security Administration
- Response Management
CISSP Accredited Security Engineering Support
The CISSP credential recognizes mastery of a worldwide standard for data security. ANSI has awarded the CISSP credential recognition in the field of data security under ISO/IEC 17024. Progent can provide access to of security professionals who have earned CISSP accreditation. Progent can provide a CISSP-certified expert to help your organization in a variety security areas such as:
Learn additional details concerning Progent's CISSP-certified Cybersecurity Consulting Expertise.
- Security Management Procedures
- Security Infrastructure and Models
- Access Management Systems and Processes
- Software Development Security
- Secure Operations
- Site Security
- Encryption/Decryption Mechanisms
- Telecommunications, Network and Internet Security
- Disaster Recovery Preparedness
CISSP-ISSAP Qualified Secure System Architecture Consulting Expertise
Progent's CISSP-ISSAP qualified network architecture engineers are consultants who have been awarded ISSAP Certification through rigorous examination and significant experience with network security design. The ISSAP certification represents proven mastery in the most complex requirements of information system security architecture within the broader scope of IS security knowledge required for CISSP accreditation. Progent's ISSAP-certified security experts can help your business with all aspects of architecture security such as.
Find out additional information concerning Progent's ISSAP Accredited Secure Network Architecture Consulting Professionals.
- Access Management Systems and Techniques
- Telecom and Network Infrastructure Security
- Data Encryption Solutions
- Requirements Analysis and Security Standards
- Business Continuity Planning (BCP) and Disaster Recovery Planning
- Hardware Security
CISA Accredited Network Security Auditing Consulting Assistance
The CISA accreditation is a prestigious qualification that indicates expertise in IS security auditing. Accredited by the American National Standards Institute, the CISA credential requires that consultants pass a comprehensive examination given by the ISACA professional group. Progent's CISA network security audit engineers are available to assist your IT organization in the areas of:
Get additional details about Progent's CISA Qualified Information System Security Auditing Consulting Expertise.
- IS Audit Process
- Information Technology Administration
- Network Assets and Infrastructure Lifecycle
- Information Technology Support
- Safeguarding Data Assets
- Disaster Recovery Preparedness
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA to validate a consultant's skills to plan, deploy, and support information system controls to reduce network risk. Progent offers the expertise of a CRISC-certified consultant to assist your company to create and execute a business continuity plan based on leading practices identified by CRISC and geared to align with your organization's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC-certified network risk mitigation experts offer a range of risk evaluation services such as:
Find out more information concerning Progent's CRISC Risk Management Consultants.
- Gather data and study documentation to identify significant vulnerabilities
- Inventory legal, industry, and contractual requirements and organizational policies associated with your network to determine their potential influence on your business goals
- Identify possible threats for your business workflows to help in evaluating your enterprise risk
- Develop a risk awareness initiative and provide training to ensure your stakeholders appreciate IS risk so they can contribute to your risk management process
- Match identified risk scenarios to related operational procedures to help determine risk responsibility
- Determine risk tolerance with your senior management and key stakeholders to make sure they align
GIAC Certified Security Consulting Assistance
Global Information Assurance Certification was established in 1999 to certify the knowledge of IT security engineers. GIAC's mission is to verify that an accredited security consultant possesses the skills appropriate to provide support in important areas of network, data, and application software security. GIAC accreditations are recognized by companies and institutions around the world including and the U.S. NSA. Progent's GIAC IS security audit specialists are available to help your business in the areas of:
Find out additional details about Progent's GIAC Information Assurance Services.
- Auditing Perimeters
- Incident Handling
- Traffic Analysis
- Web-based Application Security
- SIEM solutions
Contact a Certified Security Engineer
To learn how to access a certified security consultant for online or on-premises help in Oklahoma, call 1-800-993-9400 or visit Online Computer Help.