Company information networks in the state of Connecticut can depend on prompt and affordable online help from Progent's qualified security experts to resolve complex security problems. Rates are affordable, charges are per minute, engagement is immediate, and service is unbeatable. Progent also offers assistance for complex projects that requires the knowledge of senior security consultants with high-level industry credentials.

If your Connecticut business is outside of larger urban areas including Bridgeport, New Haven, Hartford, or Stamford, contact with local certified network security professionals is often problematic when there's a security disaster. This could mean a loss of revenue for your company, upset clients, unproductive employees, and distracted management. By utilizing Progent's online services, you have access to a qualified security consultant ready to deliver help when you have to have it to keep your system running and recover your data.

Progent can help you at any level in your efforts to protect your IT environment with services ranging from network security checks to developing a comprehensive security strategy. Progent provides affordable service to assist businesses of all sizes to configure and maintain protected IT environments based on Microsoft Windows and Cisco products and that can include computers running UNIX, Linux, Sun Solaris, or Mac OS X platforms as well as BYOD clients with Apple iOS handhelds or Google Android or Windows Phone smart phones and tablets.

Progent can also show you how to outsource spam blocking and defense against email-borne security threats. Email Guard is Progent's email security solution that incorporates the services and infrastructure of top data security vendors to deliver centralized management and comprehensive protection for all your inbound and outbound email. The powerful architecture of Email Guard combines a Cloud Protection Layer with a local security gateway device to provide advanced defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-based malware. The cloud filter serves as a preliminary barricade and blocks the vast majority of unwanted email from reaching your security perimeter. This decreases your vulnerability to inbound threats and saves system bandwidth and storage space. ProSight Email Guard's on-premises security gateway appliance adds a further layer of analysis for incoming email. For outgoing email, the local security gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and encryption. The local gateway can also enable Exchange Server to monitor and safeguard internal email that stays inside your corporate firewall.

Progent's certified consultants are available online or in person to provide a range of urgent or longer-term IT security services including:

  • Perform extensive security evaluations
  • Recuperate quickly after attacks
  • Configure firewalls from multiple vendors
  • Configure secure methods for offsite and mobile access
  • Deploy effective applications for automatic defense against spam and DHAs
  • Develop a comprehensive security strategy with 24x7 security monitoring
  • Offer comprehensive Help Desk Services
  • Help Create a practical network backup and disaster recovery strategy built around Data Protection Manager (DPM) backup capability
If your business has an immediate need for IT security help, go to Progent's Urgent Online Network Help.

Progent's consultants can deliver world-class support in vital fields of computer security that include security assessment, firewalls and VPN, and high-level security planning.

Security Audits
Progent's expert security consultants can evaluate the effectiveness of your existing computer security implementation by performing exhaustive remote automated testing based on advanced utilities and proven techniques. Progent's experience in administering this testing saves you money and offers a detailed picture of gaps. The knowledge your business is provided can be used as the basis of a security plan that can permit your information system to run safely and react rapidly to future threats.

Automated Security Assessment
Progent provides consulting in the use of security testing packages such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard NSS for economically performing a variety of programmed system testing checks to identify potential security problems. Progent has broad knowledge of other security auditing tools including NMAP, AMAP Application Scanner, eEye Vulnerability Scanner, as well as utilities like Metasploit Framework, Hydra, and Nikto. Progent can show you how to understand testing reports and respond appropriately.

Progent can show you how to design security into your business processes, install auditing software, plan and implement a protected system environment, and recommend procedures to optimize the safety of your IT system. Progent's security consultants are ready to assist you to set up a firewall, implement safe remote access to email and business applications, and install virtual private network. Find out additional information on Progent's network security evaluation.

Security Inventory and Evaluation Packages for Small Companies
Progent has put together two low-cost security inventory and evaluation bundles intended to allow small businesses to receive an independent network security evaluation from a qualified security expert. With Progent's External Security Inventory Checkup, an engineer runs a comprehensive examination of your network from outside your firewalled perimeter to determine potential risks in the security posture you expose to the public. With Progent's Internal Security Inventory Checkup, an engineer runs a system scan from a secure machine inside your company firewall to evaluate your exposure to internal assaults. Both security inventory packages are set up and run from a secured remote site. The project is directed by a consultant with high-level security accreditations and who produces a document that details and interprets the information collected by the scan and proposes practical improvements where appropriate.

Stealth Penetration Analysis Support Services
Stealth intrusion testing is an important component of any comprehensive network security plan. Progentís security experts can run extensive intrusion tests without the awareness of your company's in-house network support resources. Stealth penetration checking shows whether existing security monitoring tools such as intrusion detection warnings and event history monitoring are properly configured and consistently monitored. Find out more on Progent's stealth security penetration analysis support services.

Firewall And Virtual Private Network (VPN) Solutions
Progent's background in security solutions includes extensive familiarity with major firewalls and Virtual Private Network (VPN) products offered by multiple companies including Cisco, Microsoft, and Juniper. Progent can provide the support of engineers who have earned important networking certifications such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Troubleshooting
The current ASA 5500-X Family Next-Generation Firewalls with Firepower Services deliver substantially more value than Cisco's previous firewalls and have replaced the ASA 5500 and PIX 500 security appliances for new installations. After Cisco's acquisition of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be configured to support Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular network intrusion protection system. Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help your company to maintain your current PIX or Cisco ASA 5500 firewalls or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can assist you to plan, configure, optimize, administer and debug firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. See additional details about ASA Firewalls with Firepower Services configuration and debugging support.

Cisco Network Security and Virtual Private Network Support Services
Cisco's security and remote access technology offer a complete line of manageable security products to help protect your wired and wireless information system. Cisco's VPN line features routers, firewalls, intrusion detection systems and VPN appliances. Progent's expert staff of consultants includes field-proven specialists with Cisco CCIE and Cisco Certified Network Professional certifications who are able to assist your organization to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that fit best with your business objectives. Learn additional information concerning Progent's Engineering Expertise for Cisco Security Technology and Virtual Private Network Appliances.

Support Expertise for Additional Firewall and VPN Solutions
Progent offers small and medium size businesses professional support for Intrusion Protection products and IPsec VPN technology from leading firewall and Virtual Private Network security companies such as WatchGuard, Juniper, and Symantec. Progent can help you create a detailed security plan and choose the right products from multiple suppliers to achieve your security goals while sticking within your spending restraints.

Progent's Low-Cost Managed Services for Information Assurance
Progent's affordable ProSight series of managed services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection service that incorporates next generation behavior machine learning technology to guard endpoint devices as well as servers and VMs against new malware assaults like ransomware and file-less exploits, which routinely get by traditional signature-based AV products. ProSight ASM protects on-premises and cloud resources and provides a unified platform to address the complete threat lifecycle including protection, detection, mitigation, remediation, and forensics. Key features include single-click rollback with Windows Volume Shadow Copy Service and automatic network-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) services deliver economical multi-layer protection for physical servers and virtual machines, desktops, mobile devices, and Exchange Server. ProSight ESP uses contextual security and modern behavior analysis for continuously monitoring and reacting to security threats from all attack vectors. ProSight ESP provides two-way firewall protection, intrusion alarms, device management, and web filtering through leading-edge technologies packaged within one agent managed from a unified control. Progent's security and virtualization consultants can assist your business to design and implement a ProSight ESP deployment that addresses your company's unique needs and that allows you prove compliance with legal and industry information security regulations. Progent will assist you specify and implement policies that ProSight ESP will manage, and Progent will monitor your network and react to alerts that require immediate attention. Progent's consultants can also help your company to install and verify a backup and restore system like ProSight Data Protection Services (DPS) so you can recover rapidly from a potentially disastrous cyber attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Microsoft Exchange email filtering.

ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent offer small and mid-sized organizations a low cost and fully managed solution for secure backup/disaster recovery (BDR). Available at a low monthly cost, ProSight Data Protection Services automates your backup activities and allows fast recovery of vital data, applications and VMs that have become lost or damaged as a result of hardware breakdowns, software bugs, natural disasters, human error, or malicious attacks such as ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, apps, system images, plus Hyper-V and VMware images. Important data can be backed up on the cloud, to an on-promises device, or mirrored to both. Progent's cloud backup consultants can deliver world-class expertise to set up ProSight Data Protection Services to be compliant with regulatory standards such as HIPPA, FINRA, and PCI and, when necessary, can assist you to recover your critical data. Find out more about ProSight Data Protection Services Managed Cloud Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that incorporates the infrastructure of leading data security vendors to deliver web-based management and world-class protection for your inbound and outbound email. The hybrid architecture of Progent's Email Guard integrates a Cloud Protection Layer with an on-premises gateway device to offer advanced protection against spam, viruses, Dos Attacks, DHAs, and other email-based malware. The cloud filter acts as a first line of defense and keeps the vast majority of threats from reaching your security perimeter. This reduces your exposure to inbound threats and conserves system bandwidth and storage space. Email Guard's on-premises security gateway appliance provides a deeper level of inspection for inbound email. For outbound email, the local gateway provides AV and anti-spam protection, protection against data leaks, and email encryption. The on-premises gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email traffic that originates and ends within your corporate firewall. For more information, visit ProSight Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its key servers and applications hosted in a protected fault tolerant data center on a fast virtual host configured and managed by Progent's IT support experts. Under Progent's ProSight Virtual Hosting service model, the client owns the data, the operating system platforms, and the apps. Since the environment is virtualized, it can be moved easily to a different hardware environment without a time-consuming and difficult configuration process. With ProSight Virtual Hosting, your business is not tied one hosting service. Learn more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, retrieve and safeguard information related to your network infrastructure, processes, applications, and services. You can instantly locate passwords or serial numbers and be warned about impending expirations of SSLs or domains. By cleaning up and organizing your network documentation, you can eliminate as much as 50% of time spent searching for vital information about your IT network. ProSight IT Asset Management features a common repository for holding and sharing all documents required for managing your network infrastructure such as standard operating procedures and self-service instructions. ProSight IT Asset Management also supports a high level of automation for gathering and relating IT information. Whether youíre planning improvements, doing regular maintenance, or responding to an emergency, ProSight IT Asset Management gets you the data you need the instant you need it. Learn more about Progent's ProSight IT Asset Management service.

Certified Security Design
Any company should develop a carefully considered security strategy that incorporates both preventive processes and response plans. The pre-attack plan is a set of mechanisms intended to minimize security weaknesses. The post-attack plan helps your network security personnel to evaluate the damage resulting from an attack, fix the network, record the experience, and get business functions restored as quickly as possible.

Progent's expert IT security engineers are available to assist your business to perform a complete risk assessment and define a company-wide security plan to establish security policies and controls to reduce future attacks and threats.

CISM Accredited System Security Engineering Services
The CISM committee defines the basic capabilities and international standards of performance that information security professionals are expected to master. It gives executive management the confidence that consultants who have qualified for their CISM certification have the background and knowledge to deliver effective security management and support consulting. Progent can provide the expertise of CISM certified security professionals to assist businesses with:

  • IS Security Strategies
  • Risk Analysis
  • Network Security Program Management
  • Network Security Management
  • Recovery Planning
Read additional details concerning Progent's CISM Network Security Support Services.

CISSP Qualified Security Engineering Assistance
The CISSP credential recognizes expertise with a worldwide standard for network security. The American National Standards Institute has granted the CISSP credential accreditation in the area of data protection under ISO 17024. Progent offers the services of security professionals who have earned CISSP certification. Progent can give you access to a CISSP-certified expert to help your business in a broad range of security areas such as:

  • Security Administration Procedures
  • Security Architecture and Models
  • Access Management Solutions and Methodology
  • Applications Development Security
  • Operations Security
  • Site Security
  • Data Encryption Mechanisms
  • Telecom, LAN and WAN Security
  • Disaster Recovery Planning
Read additional information about Progent's CISSP Accredited Network Security Support Services.

ISSAP Qualified Secure IT Architecture Consulting Assistance
Progent's ISSAP qualified IT architecture engineers are consultants who have been awarded ISSAP Certification through thorough examination and extensive experience with information security design. The ISSAP credential represents proven skill in the most challenging demands of information security architecture within the wider field of information security expertise required for CISSP accreditation. Progent's ISSAP-certified security experts can help your company with all phases of architecture security such as.

  • Access Control Mechanisms and Techniques
  • Telecommunications and System Infrastructure Protection
  • Encryption/Decryption Options
  • Needs Analysis and Security Standards
  • Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
  • Site Security
Find out additional information about Progent's ISSAP Accredited Secure Information System Architecture Engineering Services.

CISA Accredited Security Auditing Consulting Services
The Certified Information Systems Auditor credential is an important achievement that signifies mastery in network security auditing. Certified by the American National Standards Institute, the CISA accreditation requires that consultants undergo a comprehensive test given by the ISACA international professional group. Progent's CISA-qualified IS security audit consultants are available to assist your business in the areas of:

  • Information Systems Audit Process
  • IT Governance
  • Network Assets and Infrastructure Lifecycle Planning
  • IT Support
  • Safeguarding Data Assets
  • Disaster Recovery Preparedness
Find out more information concerning Progent's CISA Certified Network Security Auditing Consulting Support.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC certification program was established by ISACA in 2010 to validate a consultant's ability to plan, implement, and maintain information system controls to reduce risk. Progent can provide the services of a CRISC-certified engineer to help your company to create and execute a workplace continuity plan that follows industry best practices identified by CRISC and geared to match your company's risk appetite, business objectives, and IT budget. Progent's CRISC-certified IT risk management engineers offer a variety of risk evaluation services including:

  • Gather information and review documentation to identify significant vulnerabilities
  • Inventory legal, industry, and business mandates and company policies associated with your information system to determine their possible impact on your business goals
  • Identify potential vulnerabilities for your business processes to help in analyzing your enterprise risk
  • Develop a risk awareness initiative and provide training to make sure your organization appreciate IT risk so they can contribute to your risk control program
  • Match key risk scenarios to related operational processes to help determine risk ownership
  • Determine risk appetite with executive management and key stakeholders to ensure they align
Read more information about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Qualified IS Security Consulting Support
GIAC was founded in 1999 to validate the knowledge of network security professionals. GIAC's goal is to make sure that a certified security consultant possesses the skills appropriate to provide support in vital categories of system, data, and application software security. GIAC accreditations are recognized by companies and institutions all over the world including and the United States National Security Agency. Progent's GIAC-certified IS security audit experts are available to assist your IT organization in the areas of:

  • Assessing IT Infrastructure
  • Security Incident Handling
  • Intrusion Detection
  • Web Application Security
  • SIEM solutions
Learn more information about Progent's GIAC Information Assurance Services.

Get in Touch with a Certified Progent Security Specialist
To learn how to access a security engineer for online or onsite support in Connecticut, phone 1-800-993-9400 or visit Remote Network Help.














© 2002- 2018 Progent Corporation. All rights reserved.