Business computer networks in Texas can now get quick and economical remote help from Progent's qualified network security professionals to fix urgent security problems. Rates are competitive, charges are by the minute, engagement is fast, and service is unbeatable. Progent also provides help for long-term engagements that requires the expertise of senior security engineers with high-level industry certifications.
If your Texas organization is located some distance from larger urban areas such as Houston, San Antonio, Dallas, Austin, Fort Worth, or El Paso, help from local qualified security support specialists could be limited when you have a security disaster. This can result in a loss of income for your business, angry clients, idle employees, and distracted executives. By utilizing Progent's remote support, you can get in touch with a qualified security engineer ready to offer help when you require it to get your system operating and salvage your data.
Progent can assist you in all your efforts to defend your information system with support that can range from security checks to developing a company-wide security strategy. Progent offers economical service to help companies of any size to configure and manage safe IT environments powered by Microsoft Windows and Cisco technology and that can include servers and desktops running UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as BYOD users with Apple iOS iPhones and iPads or Android or Windows Phone smart phones and tablets.
Progent can also help you outsource spam blocking and defense against e-mail-based security threats. Email Guard is Progent's email filtering and encryption platform that uses the services and infrastructure of top data security companies to deliver centralized management and world-class security for your inbound and outbound email. The powerful structure of Progent's Email Guard managed service integrates cloud-based filtering with an on-premises gateway appliance to offer complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based malware. The Cloud Protection Layer serves as a preliminary barricade and keeps most threats from making it to your network firewall. This reduces your exposure to inbound attacks and conserves system bandwidth and storage. ProSight Email Guard's on-premises security gateway appliance adds a further layer of analysis for inbound email. For outgoing email, the onsite gateway provides AV and anti-spam filtering, protection against data leaks, and encryption. The on-premises security gateway can also help Exchange Server to monitor and safeguard internal email traffic that originates and ends within your security perimeter.
Progent's certified experts are available remotely or in person to provide a variety of urgent or longer-term network security services which include:
If your network has an emergency need for IT security help, go to Progent's Urgent Online Network Support.
Progent's support professionals provide world-class support in vital facets of system protection that include auditing, firewall and VPN expertise, and advanced security planning.
Progent's certified security consultants can evaluate the vulnerability of your current network protection environment through comprehensive remote automated analysis based on sophisticated utilities and proven procedures. Progent's experience in this service saves your company time and money and offers a detailed portrayal of security holes. The information your business is provided can be used as the basis of a network protection plan that can allow your information system to run safely and react rapidly to future threats.
Automated Security Analysis
Progent offers consulting in the use of security testing products including Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard NSS for affordably performing a set of automatic system testing checks to identify possible security gaps. Progent has extensive experience with additional security analysis utilities including NMAP, AMAP Application Scanner, eEye, as well as tools like Metasploit Framework, Hydra, and Nikto. Progent can show you how to make sense of audit reports and react effectively.
Progent can show you how to design security into your company processes, configure auditing software, define and deploy a protected network environment, and recommend procedures to maximize the security of your network. Progent's security consultants are ready to help you configure a firewall, design safe remote access to email and data, and install VPN. Find out additional information concerning Progent's automated security evaluation.
Security Inventory Packages for Small Companies
Progent has put together two ultra-affordable security inventory packages intended to enable small businesses to receive an independent security assessment from a certified security expert. With Progent's External Network Security Inventory Checkup, a security engineer administers an extensive test of your network from beyond your company firewall to uncover possible risks in the security posture you present to the outside world. With Progent's Internal Security Inventory Checkup, an engineer runs a network scan from an authorized computer within your company firewall to assess vulnerabilities to inside assaults. The two security inventory packages are set up and executed from a protected remote location. The process is managed by a consultant who has earned high-level security accreditations and who produces a report that summarizes and interprets the data captured by the security scan and suggests practical remediation if called for.
Network Security Penetration Testing Consulting
Stealth intrusion testing is an important part of any comprehensive network security strategy. Progentís security professionals can perform extensive penetration tests without the awareness of your company's internal network support resources. Unannounced penetration testing uncovers whether current security monitoring tools such as intrusion detection alerts and event history analysis are properly set up and consistently checked. Find out more concerning Progent's stealth penetration testing support services.
Firewall and Virtual Private Network Expertise
Progent's background in security solutions encompasses extensive field work with major firewalls and Virtual Private Network (VPN) products offered by a variety of vendors including Cisco, Microsoft, and CheckPoint. Progent offers the services of engineers who have earned important industry accreditations including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Configuration and Debugging
The new ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide significantly more value than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX security appliances for all new installations. After Cisco's purchase of Sourcefire, the whole line of ASA 5500-X devices can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the market's most popular network intrusion protection system (IPS). Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can assist your company to manage your legacy PIX or ASA 5500 firewalls or migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your business to plan, integrate, optimize, administer and troubleshoot firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Read additional details about Cisco ASA 5500-X Firewalls with Firepower integration and debugging support.
Cisco Security and Virtual Private Network Consulting Services
Cisco's security and offsite access products represent a full line of manageable security solutions to help safeguard your local and remote network infrastructure. Cisco's VPN product family features routers, firewalls, intrusion detection systems and VPN appliances. Progent's professional consulting staff includes field-proven specialists with Cisco CCIE and CCNP qualifications who are able to assist your company to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that align best with your business objectives. Read additional information about Progent's Engineering Expertise for Cisco Security Technology and Virtual Private Network Appliances.
Consulting Services for Additional Firewall and VPN Products
Progent offers small and mid-size organizations expert consulting for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and Virtual Private Network security companies including Check Point Software, Juniper, and Symantec. Progent can help you create a comprehensive security strategy and choose the right technologies from a variety of vendors to achieve your security goals while sticking within your spending restraints.
Progent's Flat-rate Managed Services for Information Assurance
Progent's affordable ProSight family of managed services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that utilizes next generation behavior-based machine learning tools to guard endpoints and physical and virtual servers against new malware attacks such as ransomware and email phishing, which routinely escape traditional signature-matching AV tools. ProSight ASM protects local and cloud resources and offers a single platform to address the entire malware attack lifecycle including filtering, detection, containment, remediation, and forensics. Key features include one-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection services offer economical multi-layer security for physical servers and virtual machines, workstations, mobile devices, and Microsoft Exchange. ProSight ESP uses adaptive security and modern behavior analysis for round-the-clock monitoring and responding to cyber assaults from all attack vectors. ProSight ESP delivers two-way firewall protection, penetration alarms, device control, and web filtering through cutting-edge tools packaged within one agent managed from a single control. Progent's data protection and virtualization consultants can help you to plan and configure a ProSight ESP environment that meets your company's unique needs and that helps you achieve and demonstrate compliance with legal and industry data protection standards. Progent will assist you define and implement policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alarms that call for immediate action. Progent's consultants can also help your company to set up and verify a backup and disaster recovery solution such as ProSight Data Protection Services so you can recover quickly from a destructive cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Exchange filtering.
ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services provide small and medium-sized businesses an affordable end-to-end service for reliable backup/disaster recovery (BDR). For a low monthly price, ProSight DPS automates and monitors your backup activities and enables rapid recovery of vital data, applications and VMs that have become lost or damaged as a result of hardware breakdowns, software glitches, natural disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, apps, system images/, as well as Hyper-V and VMware images/. Critical data can be protected on the cloud, to an on-promises device, or mirrored to both. Progent's backup and recovery specialists can provide advanced expertise to configure ProSight DPS to to comply with government and industry regulatory standards such as HIPPA, FINRA, and PCI and, whenever needed, can assist you to recover your business-critical data. Find out more about ProSight DPS Managed Cloud Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the infrastructure of leading data security vendors to provide centralized management and comprehensive security for all your inbound and outbound email. The powerful structure of Email Guard combines cloud-based filtering with an on-premises gateway device to offer advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based threats. Email Guard's cloud filter acts as a preliminary barricade and blocks most unwanted email from making it to your security perimeter. This decreases your vulnerability to inbound attacks and conserves network bandwidth and storage. Email Guard's onsite gateway device provides a further layer of inspection for inbound email. For outgoing email, the on-premises security gateway offers AV and anti-spam filtering, DLP, and email encryption. The on-premises security gateway can also help Exchange Server to monitor and safeguard internal email traffic that stays within your security perimeter. For more information, see ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small business can have its critical servers and applications hosted in a protected Tier III data center on a fast virtual host configured and maintained by Progent's IT support experts. With the ProSight Virtual Hosting model, the customer owns the data, the operating system platforms, and the apps. Because the system is virtualized, it can be moved easily to an alternate hardware solution without a lengthy and difficult configuration process. With ProSight Virtual Hosting, your business is not locked into one hosting service. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, maintain, retrieve and safeguard information related to your IT infrastructure, procedures, applications, and services. You can quickly find passwords or IP addresses and be alerted automatically about upcoming expirations of SSL certificates or warranties. By updating and organizing your IT documentation, you can eliminate as much as 50% of time wasted trying to find critical information about your IT network. ProSight IT Asset Management includes a centralized location for holding and sharing all documents related to managing your network infrastructure like recommended procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for gathering and relating IT information. Whether youíre planning improvements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the knowledge you need as soon as you need it. Learn more about ProSight IT Asset Management service.
Expert Network Security Design
Any company ought to have a carefully considered security program that includes both pre-attack procedures and reaction planning. The pre-attack strategy is a set of mechanisms that help to reduce vulnerabilities. The reactive plan helps your company's security engineers to evaluate the damage caused by an attack, fix the damage, record the event, and get business functions operational as soon as possible.
Progent's certified IT security engineers are available to help you to run a full risk assessment and create a company-wide security plan to implement security policies and controls to mitigate ongoing assaults and dangers.
CISM Qualified Network Security Engineering Expertise
The Certified Information Security Manager (CISM) organization defines the basic capabilities and global standards of performance that IT security professionals are expected to learn. CISM gives executive management the assurance that consultants who have earned their CISM credential have the experience and knowledge to deliver effective security administration and support consulting. Progent offers the support of CISM certified security consultants to help businesses with:
Find out more information concerning Progent's CISM Certified Network Security Support Professionals.
- IS Security Processes
- Risk Analysis
- Information Security Program Management
- IS Security Management
- Recovery Planning
CISSP Qualified Security Engineering Support
CISSP certification denotes mastery of a global standard for network security. ANSI has granted certification recognition in the field of information protection under ISO/IEC 17024. Progent offers access to of security consultants who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified consultant to help your company in a variety security areas such as:
Read more information concerning Progent's CISSP Network Security Support Professionals.
- Security Administration Practices
- Security Architecture and Paradigms
- Access Control Systems and Processes
- Software Development Security
- Operations Security
- Physical Security
- Cryptography Technology
- Telecommunications, Network and WAN Security
- Business Continuity Preparedness
CISSP-ISSAP Certified Secure IT Architecture Engineering Support
Progent's CISSP-ISSAP certified network architecture professionals are consultants who have earned ISSAP status as a result of thorough testing and significant experience with network security design. The ISSAP certification represents demonstrated competence in the most complex requirements of information security architecture bounded by the wider scope of information security knowledge needed for CISSP certification. Progent's ISSAP-certified security consultants can assist your business with all phases of architecture security such as.
Read more details concerning Progent's ISSAP Qualified Secure System Architecture Engineering Professionals.
- Access Management Systems and Methodologies
- Telecommunications and Network Protection
- Encryption/Decryption Options
- Needs Analysis and Security Criteria
- BCP and Disaster Recovery Planning (DRP)
- Hardware Security
CISA Qualified Information System Security Auditing Engineering Services
The Certified Information Systems Auditor (CISA) accreditation is an important achievement that signifies expertise in network security auditing. Certified by the American National Standards Institute (ANSI), the CISA accreditation requires that consultants pass an extensive test administered by the ISACA international professional group. Progent's CISA-certified IS security audit consultants can assist your company with:
Get more details about Progent's CISA Qualified Network Security Auditing Consulting Assistance.
- Information Systems Audit Services
- Information Technology Governance
- Systems and Architecture Lifecycle
- IT Service Delivery
- Safeguarding Information Resources
- Disaster Recovery Preparedness
The CRISC certification program was established by ISACA in 2010 to validate a consultant's ability to design, deploy, and maintain information system control mechanisms to reduce risk. Progent can provide the expertise of a CRISC-certified engineer to assist your company to create and carry out a business continuity or disaster recovery strategy based on leading practices identified by CRISC and crafted to match your company's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC-certified IT risk mitigation experts can provide a range of risk identification services such as:
Learn the details concerning Progent's CRISC Risk Management Consultants.
- Gather data and review documentation to identify significant vulnerabilities
- Identify statutory, regulatory, and contractual mandates and company standards associated with your network to assess their possible impact on your business objectives
- Point out possible threats for your operational workflows to assist in analyzing your enterprise risk
- Create a risk awareness initiative and provide training to make sure your stakeholders understand information system risk so they can contribute to your risk management process
- Connect key risk scenarios to related operational procedures to help determine risk responsibility
- Validate risk appetite with your senior leadership and key stakeholders to make sure they align
GIAC Qualified IS Security Consulting Expertise
Learn additional details about Progent's GIAC Information Assurance Expertise.
GIAC was established in 1999 to validate the skill of IT security professionals. GIAC's mission is to verify that an accredited security consultant possesses the skills necessary to deliver support in critical categories of network, information, and program security. GIAC accreditations are recognized by businesses and government organizations around the world including and the U.S. National Security Agency (NSA). Progent's GIAC-qualified security audit consultants can assist your company in the areas of:
Talk to a Security Expert
To learn how you can access a certified security consultant for online or on-premises help in Texas, phone 1-800-993-9400 or go to Online Network Support.
© 2002-2019 Progent Corporation. All rights reserved.