Company IT networks in Connecticut can have prompt and economical online access to Progent's qualified network security support specialists to resolve complex security problems. The cost is affordable, billing is per minute, sign-up is fast, and support is unbeatable. Progent also provides help for complex engagements that requires the expertise of senior security consultants with high-level industry certifications.

If your Connecticut office is situated outside of more populated urban neighborhoods including Bridgeport, New Haven, Hartford, or Stamford, help from local accredited security engineers could be limited when you have an urgent situation. This could mean a drop in income for your business, angry customers, idle employees, and defocused executives. By utilizing Progent's remote support, you have access to a qualified security engineer who can deliver help whenever you require it to get your network operating and recover your data.

Progent can help you at any level in your efforts to guard your IT environment with services that can range from network security audits to creating a company-wide security plan. Progent provides economical support to help businesses of all sizes to design and manage protected networks powered by Microsoft Windows and Cisco products and that may include computers running UNIX, Linux, Solaris, or Apple Mac OS X operating systems as well as mobile users with Apple handhelds or Google Android or Windows Phone smart phones and tablets.

Progent can also show you how to outsource spam blocking and protection from email-borne security threats. Email Guard is Progent's email filtering and encryption solution that uses the technology of leading information security vendors to deliver web-based control and world-class security for all your email traffic. The powerful structure of Progent's Email Guard integrates cloud-based filtering with an on-premises security gateway device to offer advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The Cloud Protection Layer serves as a preliminary barricade and keeps the vast majority of unwanted email from reaching your network firewall. This reduces your vulnerability to inbound attacks and saves network bandwidth and storage. ProSight Email Guard's on-premises gateway device adds a further layer of inspection for incoming email. For outbound email, the on-premises gateway provides anti-virus and anti-spam filtering, protection against data leaks, and encryption. The local gateway can also help Exchange Server to monitor and safeguard internal email that originates and ends within your corporate firewall.

Progent's security engineers are accessible online or on site to offer a variety of emergency or project-based network security services including:

  • Run extensive security evaluations
  • Recover rapidly after serious security breaches
  • Set up firewalls from multiple vendors
  • Configure safe techniques for remote and mobile connectivity
  • Deploy effective applications for automatic protection against spam and directory harvest attacks
  • Develop a comprehensive security strategy with proactive security monitoring
  • Provide comprehensive Call Center Services
  • Develop a practical data backup and restore solution based on Data Protection Manager backup/restore capability
If your company has an immediate requirement for computer security support, go to Progent's Urgent Online Technical Help.

Progent's security experts can deliver world-class services in vital fields of network security including security assessment, firewall and VPN solutions, and high-level security consulting.

System Security Evaluation
Progent's expert security engineers can evaluate the strength of your current network security implementation by performing comprehensive remote automated testing based on advanced software tools and tested procedures. Progent's experience in this testing saves your company consulting fees and offers an objective portrayal of security holes. The information your company is provided can make up the foundation of a security plan that can permit your network to operate safely and adapt rapidly to future threats.

Automated Network Vulnerability Assessment
Progent provides consulting in the application of security testing products such as MBSA and LANguard from GFI for affordably running a set of automatic system testing scans to identify possible security gaps. Progent has broad experience with additional network auditing utilities such as NMAP, AMAP Application Scanner, eEye Vulnerability Scanner, plus tools such as Metasploit Framework, Netcat, Socat, and Nikto. Progent can show you how to make sense of audit reports and react effectively.

Progent can show you how to build security into your business processes, install scanning applications, define and deploy a protected network environment, and suggest procedures to optimize the security of your IT system. Progent's security consultants are able to help you set up a firewall, implement secure remote connectivity to email and data, and install virtual private network. Find out more concerning Progent's network security audits.

Security Inventory Service Packages for Small Businesses
Progent offers two low-cost security inventory bundles intended to allow small companies to get an independent security evaluation from a certified security consultant. With Progent's External Network Security Inventory Scan, a security engineer administers an extensive examination of your IT infrastructure from outside your firewall to uncover potential risks in the security profile you present to the outside world. With Progent's Internal Network Security Inventory Checkup, an engineer executes a network scan from an authorized machine inside your firewall to determine vulnerabilities to inside assaults. Both security inventory packages are set up and executed from a protected remote location. The process is directed by an engineer with top security accreditations and who generates a document that summarizes and analyzes the information collected by the security scan and suggests practical improvements where called for.

Network Security Penetration Testing Support Services
Stealth penetration checking is a key component of any comprehensive IT system security plan. Progentís security experts can perform extensive penetration tests without the awareness of your company's internal IT resources. Stealth penetration checking uncovers whether existing security defense systems such as intrusion incident warnings and event log monitoring are correctly set up and consistently checked. Learn additional information concerning Progent's network penetration testing consulting.

Firewall and Virtual Private Network Support
Progent's background in security technology includes in-depth field work with leading firewalls and Virtual Private Network products from a variety of companies such as Cisco, Microsoft, and Juniper. Progent offers the services of engineers with important networking certifications such as CCIE and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Troubleshooting
The current ASA 5500-X Family Next-Generation Firewalls with Firepower Services deliver significantly more bang for the buck than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX firewalls for all new installations. Since Cisco's purchase of Sourcefire, the entire family of Cisco ASA 5500-X devices can be provisioned to enable Firepower Services, built on Sourcefire's Snort product, which is the market's most popular network intrusion protection system. Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can help your company to manage your existing PIX or Cisco ASA 5500 firewalls and upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your company to design, integrate, optimize, manage and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about Cisco ASA Firewalls with Firepower configuration and debugging support.

Cisco Network Security and Virtual Private Network Engineering Services
Cisco's network security and remote access products provide a full line of manageable security solutions to help protect your wired and wireless information system. Cisco's VPN product family features routers, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's expert consulting staff includes experienced engineers with Cisco Certified Internetwork Expert and Cisco Certified Network Professional certifications who are able to assist your organization to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that fit best with your business goals. Learn additional details concerning Progent's Engineering Expertise for Cisco Security and Virtual Private Network Appliances.

Support Expertise for Additional Firewall and Virtual Private Network Technology
Progent offers small and mid-size organizations expert consulting for Intrusion Protection Systems and IPsec VPN technology from leading firewall and VPN security companies including Check Point Software, Juniper, and SonicWALL. Progent can help you design a detailed security strategy and choose appropriate technologies from a variety of suppliers to achieve your security objectives while sticking within your budget restraints.

Progent's Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight series of network management outsourcing services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services offered by Progent include:
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email security platform that incorporates the services and infrastructure of top data security vendors to deliver web-based management and comprehensive protection for all your inbound and outbound email. The hybrid architecture of Progent's Email Guard integrates cloud-based filtering with a local security gateway appliance to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne threats. The cloud filter serves as a first line of defense and blocks the vast majority of threats from reaching your network firewall. This decreases your vulnerability to external attacks and saves system bandwidth and storage space. ProSight Email Guard's onsite security gateway appliance provides a deeper level of inspection for inbound email. For outgoing email, the onsite gateway offers anti-virus and anti-spam filtering, DLP, and email encryption. The on-premises security gateway can also help Exchange Server to track and protect internal email that stays within your security perimeter. Find out more about Progent's ProSight Email Guard Spam Filtering, Virus Defense, Content Filtering and Data Loss Prevention.

ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes cutting edge behavior-based analysis technology to guard endpoints and physical and virtual servers against modern malware assaults such as ransomware and file-less exploits, which routinely get by legacy signature-matching anti-virus tools. ProSight Active Security Monitoring protects on-premises and cloud resources and offers a single platform to address the complete malware attack lifecycle including protection, detection, mitigation, remediation, and forensics. Key features include one-click rollback using Windows VSS and automatic system-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) Next-Generation Endpoint Protection and Ransomware Recovery.

ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent offer small and medium-sized organizations an affordable end-to-end solution for secure backup/disaster recovery (BDR). For a low monthly price, ProSight DPS automates your backup processes and allows rapid restoration of critical data, apps and VMs that have become lost or corrupted as a result of component breakdowns, software glitches, disasters, human error, or malicious attacks such as ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to an on-promises storage device, or to both. Progent's backup and recovery consultants can provide world-class expertise to configure ProSight DPS to to comply with government and industry regulatory requirements such as HIPPA, FIRPA, PCI and Safe Harbor and, whenever needed, can assist you to restore your critical information. Find out more about ProSight Data Protection Services Managed Backup and Recovery.

Expert Network Security Design
Every company ought to develop a carefully considered security program that incorporates both preventive processes and response planning. The pre-attack plan is a collection of steps designed to minimize vulnerabilities. The reactive strategy helps your company's IT security engineers to evaluate the impact resulting from a security penetration, fix the damage, record the experience, and get business functions running as rapidly as feasible.

Progent's expert information security consultants are available to assist your business to run a full risk assessment and define a network security plan to establish security policies and mechanisms to reduce ongoing attacks and threats.

CISM Qualified Security Engineering Services
The CISM organization defines the core capabilities and international standards of skill that information security professionals are expected to master. CISM provides executive management the assurance that those who have qualified for their CISM credential have the experience and knowledge to deliver efficient security management and consulting consulting. Progent can provide the services of CISM certified security consultants to assist companies with:

  • IS Security Governance
  • Vulnerability Management
  • IS Security Program Management
  • Information Security Management
  • Response Management
Learn more information about Progent's CISM Certified Security Consulting Services.

CISSP Accredited Security Engineering Support
CISSP certification denotes expertise with a global standard for data security. ANSI has granted the CISSP credential accreditation in the field of data protection stipulated by ISO/IEC 17024. Progent can provide the services of security consultants who have earned CISSP accreditation. Progent can give you access to a CISSP-certified consultant to help your organization in a variety security fields including:

  • Security Administration Practices
  • Security Infrastructure and Paradigms
  • Access Management Systems and Processes
  • Software Development Security
  • Operations Security
  • Site Security
  • Encryption/Decryption Mechanisms
  • Telecommunications, Network and Internet Security
  • Disaster Recovery Planning
Learn more information about Progent's CISSP Accredited IS Security Consulting Services.

ISSAP Qualified Secure IT Architecture Engineering Expertise
Progent's ISSAP qualified network architecture professionals are experts who have been awarded ISSAP Certification as a result of rigorous examination and significant work with information security architecture. The ISSAP credential represents proven skill in the more challenging demands of information system security architecture within the broader field of IS security expertise required for CISSP certification. Progent's ISSAP-certified security consultants can assist your business with all phases of secure network architecture such as.

  • Access Control Systems and Methodologies
  • Telecom and System Infrastructure Security
  • Encryption/Decryption Solutions
  • Requirements Analysis and Security Standards
  • BCP and DRP
  • Hardware Security
Read additional information about Progent's ISSAP Certified Secure System Architecture Support Services.

CISA Certified Security Auditing Consulting Expertise
The Certified Information Systems Auditor credential is a recognized achievement that represents mastery in IS security auditing. Accredited by ANSI, the CISA credential has candidates undergo an extensive test administered by the ISACA international professional association. Progent's CISA information security audit engineers are available to assist your business with:

  • IS Audit Process
  • Information Technology Governance
  • Systems and Architecture Lifecycle
  • IT Support
  • Protecting Data Assets
  • Disaster Recovery Preparedness
Get additional information about Progent's CISA Qualified Network Security Auditing Engineering Support.

CRISC Experts
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA in 2010 to verify an IT professional's skills to design, deploy, and support IS control mechanisms to mitigate network risk. Progent can provide the services of a CRISC-certified consultant to help your company to create and execute a business continuity or disaster recovery strategy based on leading practices promoted by CRISC and geared to match your organization's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC-qualified network risk management specialists can provide a variety of risk assessment services including:

  • Collect data and study documentation to identify significant vulnerabilities
  • Inventory legal, regulatory, and contractual mandates and company policies associated with your network to determine their possible impact on your business goals
  • Point out potential threats for your business workflows to assist in evaluating your enterprise risk
  • Create a risk awareness initiative and conduct training to ensure your organization appreciate IS risk so they can assist with your risk management program
  • Match key risk scenarios to your associated business processes to help assign risk ownership
  • Determine risk appetite with executive management and key stakeholders to ensure they match
Read the details about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Certified Network Security Consulting Expertise
GIAC was founded in 1999 to certify the knowledge of information technology security experts. GIAC's goal is to make sure that an accredited security consultant has the knowledge needed to provide support in key areas of system, information, and application program security. GIAC certifications are recognized by companies and institutions all over the world including and the United States National Security Agency (NSA). Progent's GIAC-qualified network security audit consultants can assist your company in the areas of:

  • Auditing IT Infrastructure
  • Incident Handling
  • Traffic Analysis
  • Web-based Services Security
  • SIEM solutions
Find out additional details concerning Progent's GIAC Information Assurance Expertise.

Talk to a Progent Security Expert
To find out how you can get in touch with a certified security consultant for online or onsite support in Connecticut, phone 1-800-993-9400 or visit Online Computer Support.

© 2002- 2018 Progent Corporation. All rights reserved.