Business computer networks in Connecticut can depend on prompt and affordable online technical support from Progent's accredited security consultants to help with critical security issues. Rates are reasonable, billing is by the minute, engagement is fast, and support is world class. Progent also provides help for long-term engagements that demand the expertise of seasoned security engineers with high-level industry certifications.

In case your Connecticut company is far from major metropolitan neighborhoods such as Bridgeport, New Haven, Hartford, or Stamford, contact with nearby certified security consultants could be problematic when there's an urgent situation. This can result in a drop in revenue for your business, angry clients, unproductive employees, and defocused executives. By calling Progent's remote support, you can get in touch with a qualified security professional who can provide expertise whenever you require it to get your computer network on line and restore your information.

Progent can assist you in all your efforts to defend your IT environment with support services ranging from security checks to developing a company-wide security plan. Progent offers economical service to help companies of any size to design and manage protected networks based on Microsoft Windows and Cisco products and that can include computers based on UNIX, Linux, Solaris, or Apple Mac OS X platforms plus BYOD users with Apple iPhones and iPads or Google Android or Windows Phone devices.

Progent can also show you how to outsource spam filtering and defense against e-mail-based assaults. Email Guard is Progent's email filtering and encryption platform that incorporates the technology of leading information security companies to provide web-based control and world-class security for all your email traffic. The powerful structure of Progent's Email Guard managed service integrates cloud-based filtering with an on-premises gateway appliance to offer advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. ProSight Email Guard's cloud filter acts as a first line of defense and keeps the vast majority of unwanted email from reaching your network firewall. This decreases your vulnerability to inbound threats and conserves network bandwidth and storage space. ProSight Email Guard's on-premises gateway appliance adds a deeper level of analysis for incoming email. For outbound email, the on-premises security gateway provides AV and anti-spam protection, protection against data leaks, and email encryption. The onsite security gateway can also enable Exchange Server to track and safeguard internal email that stays within your corporate firewall.

Progent's certified engineers are available remotely or on site to offer a variety of emergency or longer-term network security services which include:

  • Perform thorough network security evaluations
  • Recover promptly after serious security breaches
  • Configure firewalls from multiple vendors
  • Configure secure techniques for remote and mobile access
  • Deploy effective software for defense against spam and directory harvest attacks
  • Help create a comprehensive security strategy with proactive monitoring
  • Provide outsourced Help Desk Support
  • Help Develop a practical backup and recovery strategy built around Microsoft Data Protection Manager backup/restore technology
If your company has an urgent requirement for IT security support, go to Progent's Urgent Online Technical Support.

Progent's consultants can deliver world-class services in key facets of computer protection including analysis, firewall and VPN solutions, and high-level security planning.

Security Audits
Progent's certified security consultants can evaluate the vulnerability of your existing network security implementation through exhaustive remote automated analysis via sophisticated software tools and proven techniques. Progent's experience in administering this testing saves you time and money and offers a detailed picture of gaps. The knowledge your business gains can be used as the basis of a network protection plan that will allow your information system to run safely and adapt quickly to future threats.

Automated Vulnerability Analysis
Progent provides consulting in the use of security testing products including MBSA and GFI LANguard NSS for affordably running a set of programmed network auditing scans to identify potential security weaknesses. Progent has extensive experience with additional network auditing products such as NMAP Port Scanner, AMAP Application Scanner, eEye Vulnerability Scanner, as well as utilities like SolarWinds, Netcat, and Nikto. Progent can help you to make sense of audit reports and respond effectively.

Progent can show you how to design protection into your business processes, install scanning tools, define and deploy a secure system environment, and recommend policies to maximize the safety of your IT system. Progent's security professionals are available to assist you to set up a firewall, design secure remote access to email and data, and integrate virtual private network. Learn additional information on Progent's network security analysis.

Security Inventory Service Bundles for Small Companies
Progent offers two ultra-affordable security inventory and evaluation packages designed to enable small companies to receive an impartial network security evaluation from a certified security specialist. With Progent's External Network Security Inventory Checkup, a security engineer administers a comprehensive test of your network from outside your firewall to determine possible weaknesses in the security posture you expose to the outside world. With Progent's Internal Security Inventory Scan, a security expert runs a system scan from an authorized machine inside your firewall to uncover your exposure to internal assaults. The two security inventory services are configured and executed from a protected external site. The process is managed by a consultant who has earned top security accreditations and who generates a document that summarizes and analyzes the information collected by the security scan and proposes practical improvements where called for.

Stealth Penetration Analysis Support Services
Stealth penetration checking is a key part of any successful IT system security plan. Progents security professionals can perform extensive intrusion checks without the knowledge of your company's in-house IT resources. Stealth penetration checking shows whether current security defense systems such as intrusion incident warnings and event log analysis are properly set up and actively monitored. Learn additional information on Progent's stealth security penetration analysis consulting.

Firewall and Virtual Private Network Expertise
Progent's expertise in security solutions includes in-depth field work with major firewalls and Virtual Private Network (VPN) technology offered by multiple vendors including Cisco, Microsoft, and CheckPoint. Progent offers the services of consultants who have earned important industry certifications such as CCIE and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Configuration and Debugging
The new ASA 5500-X Series of firewalls with Firepower Services offer significantly more bang for the buck than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new installations. After Cisco's purchase of Sourcefire, the whole family of Cisco ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort product, which is the world's most popular intrusion protection system (IPS). Firepower services bring powerful new features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist you to maintain your existing PIX or Cisco ASA 5500 firewalls or upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite help with ASA 5500-X firewalls with Firepower Services and can help you to design, deploy, optimize, manage and troubleshoot firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. See additional details about Cisco ASA 5500-X Firewalls with Firepower configuration and troubleshooting services.

Cisco Network Security and VPN Support Expertise
Cisco's security and remote access technology represent a comprehensive range of easy-to-administer security solutions to help protect your wired and wireless network infrastructure. Cisco's VPN line features switches, firewalls, intrusion detection devices and VPN concentrators. Progent's professional consulting staff includes experienced engineers with Cisco's Certified Internetwork Expert and CCNP qualifications who are able to assist your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that fit most closely with your company objectives. Read more information about Progent's Consulting Services for Cisco Security Solutions and Virtual Private Network Appliances.

Support Expertise for Other Firewall and VPN Products
Progent provides small and mid-size organizations expert support for Intrusion Protection products and IPsec VPN solutions from leading firewall and VPN security companies including WatchGuard, Juniper Networks, and SonicWALL. Progent can show you how to create a detailed security plan and choose the right products from multiple vendors to achieve your security goals while sticking within your budget limits.

Progent's Low-Cost Managed Services for Information Security
Progent's low-cost ProSight portfolio of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes cutting edge behavior machine learning technology to guard endpoint devices as well as servers and VMs against new malware attacks like ransomware and email phishing, which easily escape traditional signature-based anti-virus tools. ProSight ASM protects on-premises and cloud resources and offers a single platform to automate the entire threat progression including protection, identification, mitigation, remediation, and forensics. Top features include one-click rollback using Windows VSS and automatic system-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection (ESP) services offer ultra-affordable in-depth security for physical servers and VMs, desktops, smartphones, and Exchange email. ProSight ESP uses contextual security and modern behavior analysis for round-the-clock monitoring and reacting to cyber assaults from all vectors. ProSight ESP offers firewall protection, intrusion alarms, endpoint management, and web filtering via cutting-edge tools incorporated within one agent managed from a unified console. Progent's data protection and virtualization consultants can assist your business to design and configure a ProSight ESP environment that addresses your company's unique requirements and that allows you demonstrate compliance with legal and industry data protection standards. Progent will assist you specify and configure security policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alarms that call for urgent attention. Progent's consultants can also help your company to set up and verify a backup and disaster recovery system like ProSight Data Protection Services so you can get back in business quickly from a destructive security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Microsoft Exchange email filtering.

ProSight DPS: Managed Backup
ProSight Data Protection Services provide small and mid-sized businesses an affordable end-to-end service for secure backup/disaster recovery (BDR). Available at a fixed monthly cost, ProSight Data Protection Services automates and monitors your backup activities and allows rapid recovery of vital files, apps and virtual machines that have become lost or damaged due to component failures, software glitches, natural disasters, human mistakes, or malicious attacks such as ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, applications, system images, plus Hyper-V and VMware images. Important data can be protected on the cloud, to a local storage device, or to both. Progent's backup and recovery consultants can provide world-class support to set up ProSight DPS to be compliant with regulatory requirements such as HIPPA, FINRA, and PCI and, when needed, can help you to restore your critical data. Learn more about ProSight DPS Managed Backup.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the technology of top data security vendors to deliver centralized control and world-class security for your email traffic. The powerful structure of Email Guard combines a Cloud Protection Layer with an on-premises security gateway appliance to provide complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. Email Guard's Cloud Protection Layer acts as a first line of defense and keeps most threats from making it to your security perimeter. This reduces your vulnerability to inbound attacks and saves system bandwidth and storage. Email Guard's on-premises security gateway device adds a further level of analysis for inbound email. For outgoing email, the onsite security gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The local gateway can also help Exchange Server to monitor and safeguard internal email that originates and ends inside your security perimeter. For more information, see ProSight Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its critical servers and applications hosted in a protected Tier III data center on a fast virtual host set up and maintained by Progent's network support experts. With Progent's ProSight Virtual Hosting model, the client retains ownership of the data, the OS software, and the applications. Since the environment is virtualized, it can be ported immediately to an alternate hosting environment without requiring a lengthy and difficult reinstallation procedure. With ProSight Virtual Hosting, you are not locked into one hosting service. Learn more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, update, retrieve and protect data related to your IT infrastructure, processes, business apps, and services. You can instantly locate passwords or IP addresses and be alerted about impending expirations of SSL certificates or warranties. By updating and organizing your network documentation, you can eliminate up to 50% of time thrown away looking for critical information about your network. ProSight IT Asset Management includes a common repository for holding and sharing all documents required for managing your network infrastructure like standard operating procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and associating IT data. Whether youre planning improvements, doing regular maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the knowledge you need as soon as you need it. Learn more about Progent's ProSight IT Asset Management service.

Certified Security Design
Every business ought to develop a carefully considered security program that incorporates both pre-attack processes and response planning. The proactive strategy is a collection of steps designed to minimize vulnerabilities. The post-attack plan helps your security personnel to evaluate the impact caused by a security penetration, repair the system, document the experience, and get business functions operational as rapidly as feasible.

Progent's expert information security engineers can to help your business to perform a complete risk evaluation and create a network security plan to establish security policies and controls to minimize ongoing assaults and threats.

CISM Accredited Security Support Expertise
The CISM organization defines the core capabilities and global standards of performance that information security professionals are required to learn. CISM provides executive management the assurance that those who have qualified for their CISM credential possess the background and capability to deliver effective security administration and consulting services. Progent can provide the support of CISM qualified security consultants to help businesses with:

  • IS Security Governance
  • Risk Analysis
  • Information Security Program Management
  • IS Security Management
  • Response Planning
Learn additional details about Progent's CISM Certified Network Security Consulting Professionals.

CISSP Certified Security Engineering Expertise
CISSP recognizes mastery of a global standard for data security. ANSI has granted the CISSP credential accreditation in the area of data protection stipulated by ISO/IEC 17024. Progent can provide access to of security consultants who have qualified for CISSP certification. Progent can provide a CISSP-certified professional to help your business in a variety security areas such as:

  • Security Management Practices
  • Security Infrastructure and Paradigms
  • Access Management Solutions and Methodology
  • Software Development Security
  • Operations Security
  • Site Security
  • Data Encryption Mechanisms
  • Telecom, Network and Internet Security
  • Disaster Recovery Planning
Find out additional information about Progent's CISSP IS Security Consulting Professionals.

ISSAP Certified Secure Information System Architecture Consulting Assistance
Progent's ISSAP certified network architecture professionals are experts who have been awarded ISSAP Certification as a result of thorough examination and significant work with information security architecture. The Information System Security Architecture Professional (ISSAP) credential indicates proven competence in the most in-depth requirements of information system security architecture within the wider field of information security knowledge needed for CISSP certification. Progent's ISSAP-certified security consultants can assist your company with all phases of architecture security including.

  • Access Control Mechanisms and Techniques
  • Telecommunications and System Infrastructure Protection
  • Encryption/Decryption Options
  • Requirements Evaluation and Security Guidelines
  • Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
  • Hardware Security
Find out additional information about Progent's ISSAP Qualified Secure System Architecture Engineering Services.

CISA Qualified Information System Security Auditing Engineering Support
The Certified Information Systems Auditor (CISA) credential is an important achievement that represents mastery in network security audit and control. Accredited by ANSI, the CISA accreditation requires that candidates undergo a comprehensive examination administered by the ISACA professional association. Progent's CISA-certified IS security audit engineers can assist your IT organization with:

  • IS Audit Process
  • Information Technology Governance
  • Network Assets and Infrastructure Lifecycle
  • IT Service Delivery
  • Safeguarding Information Assets
  • Disaster Recovery Planning
Get additional information concerning Progent's CISA Certified Security Auditing Consulting Support.

CRISC Experts
The CRISC program was established by ISACA to verify an IT professional's skills to design, deploy, and support information system controls to reduce risk. Progent offers the expertise of a CRISC-certified engineer to assist you to develop and carry out a workplace continuity or disaster recovery plan based on leading practices promoted by CRISC and crafted to align with your company's risk tolerance, business objectives, and IT budget. Progent's CRISC-qualified network risk management engineers can provide a range of risk evaluation services such as:

  • Gather data and study documentation to help identify significant vulnerabilities
  • Identify legal, regulatory, and contractual mandates and organizational policies related to your information system to assess their potential influence on your strategic goals
  • Identify potential threats for your business workflows to help in evaluating your enterprise risk
  • Develop a risk awareness program and provide seminars to make sure your stakeholders appreciate IT risk so they can contribute to your risk management process
  • Match identified risk scenarios to your associated operational procedures to help determine risk responsibility
  • Validate risk tolerance with your senior leadership and key stakeholders to make sure they match
Find out more details about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Accredited Network Security Engineering Expertise
GIAC was founded in 1999 to certify the skill of computer security experts. GIAC's goal is to verify that an accredited professional has the skills appropriate to provide support in vital areas of network, data, and application program security. GIAC certifications are recognized by businesses and government organizations around the world including and the U.S. National Security Agency. Progent's GIAC IS security audit consultants are available to help your IT organization with:

  • Assessing Security Systems
  • Incident Response
  • Traffic Analysis
  • Web Application Security
  • SIEM solutions
Read additional details concerning Progent's GIAC Information Assurance Services.

Talk to a Progent Security Specialist
To learn how you can get in touch with a certified Progent security engineer for remote or onsite expertise in Connecticut, call 1-800-993-9400 or visit Remote Network Help.














© 2002- 2018 Progent Corporation. All rights reserved.