Company information networks in the state of Connecticut now have fast and economical remote help from Progent's qualified network security experts to help with the toughest security issues. The cost is competitive, charges are by the minute, engagement is immediate, and support is unbeatable. Progent also provides assistance for complex engagements that requires the expertise of senior security consultants with top security credentials.

If your Connecticut company is situated outside of more populated metropolitan neighborhoods including Bridgeport, New Haven, Hartford, or Stamford, the availability of local certified network security professionals could be problematic during an urgent situation. This can result in a drop in income for your business, angry clients, unproductive employees, and defocused executives. By calling Progent, you can get in touch with a qualified security engineer who can provide assistance whenever you have to have it to keep your information system operating and salvage your data.

Progent can help you in your efforts to protect your information system with services ranging from security audits to creating a company-wide security strategy. Progent provides affordable support to assist companies of any size to set up and maintain secure networks powered by Windows and Cisco products and that can include computers running UNIX or Linux operating systems as well as mobile users with Apple handhelds or Google Android or Windows Phone smart phones and tablets.

Progent can also assist you to outsource spam filtering and defense against email-borne attacks. Email Guard is Progent's email security solution that incorporates the technology of leading data security companies to provide centralized management and comprehensive protection for all your inbound and outbound email. The powerful structure of Progent's Email Guard managed service integrates cloud-based filtering with an on-premises gateway device to provide advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The cloud filter serves as a first line of defense and keeps most unwanted email from reaching your network firewall. This decreases your vulnerability to inbound threats and conserves system bandwidth and storage space. ProSight Email Guard's on-premises gateway appliance provides a further layer of inspection for incoming email. For outgoing email, the onsite gateway provides AV and anti-spam filtering, protection against data leaks, and encryption. The onsite security gateway can also help Exchange Server to track and safeguard internal email that stays within your security perimeter.

Progent's security experts are available online or on premises to provide a variety of emergency or project-based network security services which include:

  • Perform thorough network security audits
  • Recover rapidly after serious security breaches
  • Install firewalls from multiple vendors
  • Configure safe solutions for offsite and mobile connectivity
  • Deploy advanced applications for automatic protection against viruses, spam and DHAs
  • Help create a company-wide security strategy with 24x7 monitoring
  • Offer comprehensive Help Desk Services
  • Create a practical data backup and business continuity solution based on Data Protection Manager (DPM) backup technology
If your network has an urgent need for computer security support, refer to Progent's Urgent Online Technical Support.

Progent's security experts offer advanced services in vital areas of system protection that include auditing, firewall and VPN solutions, and high-level security consulting.

System Audits
Progent's certified security consultants can evaluate the strength of your existing computer security systems by performing comprehensive remote automated testing via sophisticated software tools and proven procedures. Progent's experience in this testing saves you money and offers an objective picture of system vulnerability. The knowledge your business gains can make up the basis of a security strategy that will allow your network to run dependably and respond quickly to new risks.

Automated Network Security Audits
Progent offers expertise in the use of security evaluation software such as MBSA and GFI LANguard for economically running a variety of programmed system auditing scans to identify potential security vulnerabilities. Progent has broad experience with other network analysis utilities such as NMAP, AMAP, eEye, plus tools like SolarWinds, Netcat, Hydra, and Nikto. Progent can help you to make sense of audit reports and react effectively.

Progent can help you design protection into your business operations, install scanning applications, define and deploy a secure network architecture, and suggest procedures to maximize the security of your IT system. Progent's security engineers are available to assist you to configure a firewall, implement safe remote access to email and data, and install VPN. Learn more about Progent's automated security audits.

Security Inventory Scanning Packages for Small Businesses
Progent offers two low-cost security inventory scanning packages designed to enable small businesses to get an impartial security assessment from a certified security specialist. With Progent's External Network Security Inventory Checkup, an engineer runs a comprehensive examination of your network from outside your firewall to uncover potential risks in the security profile you present to the outside world. With Progent's Internal Network Security Inventory Checkup, a security expert runs a system scan from a secure machine inside your firewall to determine vulnerabilities to internal attacks. Both security inventory packages are configured and executed from a secured external location. The project is managed by an engineer who has earned top security credentials and who generates a document that summarizes and interprets the data collected by the scan and suggests cost-effective remediation where appropriate.

Network Penetration Testing Consulting
Stealth penetration testing is a key part of any successful IT system security plan. Progent’s security professionals can run thorough intrusion tests without the knowledge of your organization's in-house IT staff. Unannounced penetration checking uncovers whether existing security monitoring tools such as intrusion detection warnings and event history monitoring are properly configured and actively monitored. Find out additional information about Progent's network security penetration analysis support services.

Firewall/VPN Expertise
Progent's expertise in security technology encompasses extensive familiarity with leading firewalls and VPN technology from multiple companies including Cisco, Microsoft, and CheckPoint. Progent can provide the services of engineers who have earned key industry certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Integration and Troubleshooting
The latest generation of Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer substantially more bang for the buck than Cisco's previous firewalls and have superseded the ASA 5500 and PIX 500 security appliances for new installations. After Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort technology, which is the market's most deployed intrusion protection system. Firepower services bring enhanced capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can assist you to manage your current PIX or Cisco ASA 5500 firewalls and migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite support for ASA 5500-X firewalls with Firepower Services and can help your organization to plan, configure, optimize, administer and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Read additional details about Cisco ASA Firewalls with Firepower configuration and debugging support.

Cisco Security and Virtual Private Network Consulting Expertise
Cisco's network security and remote access technology provide a comprehensive line of easy-to-administer security solutions to help protect your local and remote network infrastructure. Cisco's VPN line features switches, firewalls, intrusion detection systems and VPN concentrators. Progent's professional consulting staff includes field-proven engineers with Cisco CCIE and CCNP certifications who are able to help your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that fit most closely with your business objectives. Read additional information concerning Progent's Engineering Expertise for Cisco Security and VPN Products.

Engineering Expertise for Additional Firewall and VPN Solutions
Progent offers small and mid-size companies professional support for Intrusion Protection products and IPsec VPN technology from major firewall and Virtual Private Network security vendors including Check Point Software, Juniper Networks, and Symantec. Progent can show you how to design a detailed security plan and choose appropriate products from multiple vendors to support your security goals while staying within your spending restraints.

Progent's Flat-rate Managed Services for Information Security
Progent's affordable ProSight family of network management outsourcing services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. Managed services offered by Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection solution that incorporates cutting edge behavior machine learning tools to guard endpoint devices and physical and virtual servers against modern malware attacks such as ransomware and file-less exploits, which routinely evade legacy signature-based anti-virus tools. ProSight ASM protects on-premises and cloud resources and offers a single platform to manage the entire malware attack progression including filtering, detection, mitigation, cleanup, and post-attack forensics. Top capabilities include single-click rollback with Windows Volume Shadow Copy Service and real-time system-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection: Unified Endpoint Protection
ProSight Enhanced Security Protection managed services deliver ultra-affordable in-depth protection for physical servers and virtual machines, workstations, smartphones, and Microsoft Exchange. ProSight ESP uses adaptive security and modern behavior analysis for continuously monitoring and responding to security threats from all vectors. ProSight ESP delivers two-way firewall protection, penetration alarms, device management, and web filtering via leading-edge technologies packaged within one agent accessible from a single console. Progent's security and virtualization experts can assist you to plan and configure a ProSight ESP deployment that addresses your company's unique needs and that helps you demonstrate compliance with government and industry data protection regulations. Progent will help you define and configure policies that ProSight ESP will enforce, and Progent will monitor your network and react to alerts that call for urgent attention. Progent's consultants can also assist your company to set up and verify a backup and disaster recovery system such as ProSight Data Protection Services (DPS) so you can get back in business quickly from a potentially disastrous cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Microsoft Exchange email filtering.

ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent provide small and mid-sized businesses an affordable end-to-end solution for secure backup/disaster recovery (BDR). Available at a low monthly rate, ProSight Data Protection Services automates your backup activities and allows rapid recovery of critical files, applications and VMs that have become lost or damaged as a result of hardware breakdowns, software glitches, disasters, human mistakes, or malicious attacks such as ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local device, or to both. Progent's backup and recovery specialists can provide world-class support to configure ProSight DPS to to comply with government and industry regulatory standards such as HIPPA, FIRPA, PCI and Safe Harbor and, when needed, can help you to recover your critical data. Find out more about ProSight DPS Managed Cloud Backup and Recovery.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the infrastructure of top data security companies to deliver centralized control and world-class security for all your inbound and outbound email. The powerful structure of Email Guard combines cloud-based filtering with a local gateway device to provide complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The cloud filter serves as a first line of defense and keeps the vast majority of unwanted email from reaching your network firewall. This decreases your exposure to inbound attacks and saves system bandwidth and storage. Email Guard's on-premises security gateway appliance provides a further layer of inspection for incoming email. For outbound email, the onsite gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also help Exchange Server to monitor and safeguard internal email that originates and ends within your corporate firewall. For more details, visit ProSight Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small business can have its key servers and apps hosted in a secure Tier III data center on a high-performance virtual host set up and maintained by Progent's IT support professionals. With Progent's ProSight Virtual Hosting service model, the client owns the data, the operating system software, and the apps. Because the system is virtualized, it can be ported immediately to an alternate hosting environment without a lengthy and difficult reinstallation procedure. With ProSight Virtual Hosting, your business is not tied a single hosting service. Find out more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, retrieve and protect data related to your IT infrastructure, procedures, applications, and services. You can instantly find passwords or IP addresses and be warned automatically about upcoming expirations of SSL certificates ,domains or warranties. By updating and organizing your network documentation, you can eliminate up to half of time thrown away trying to find critical information about your network. ProSight IT Asset Management features a common location for holding and sharing all documents related to managing your network infrastructure such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports advanced automation for collecting and associating IT data. Whether you’re making enhancements, doing maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the knowledge you need when you need it. Find out more details about Progent's ProSight IT Asset Management service.

Expert Security Design
Any business ought to have a carefully considered security program that includes both pre-attack processes and response planning. The pre-attack plan is a collection of procedures designed to minimize vulnerabilities. The reactive strategy helps your network security engineers to assess the damage caused by a security penetration, fix the system, document the experience, and get business functions operational as rapidly as possible.

Progent's expert information security consultants are available to assist your business to run a full vulnerability assessment and define a computer security plan to establish security policies and mechanisms to minimize future assaults and dangers.

CISM Certified Information Security Engineering Assistance
The Certified Information Security Manager (CISM) committee defines the core competencies and worldwide standards of skill that IT security professionals are expected to master. CISM provides business management the confidence that those who have qualified for their CISM certification possess the background and knowledge to deliver efficient security management and consulting services. Progent can provide the support of CISM certified security professionals to assist companies with:

  • IS Security Strategies
  • Vulnerability Management
  • Information Security Program Management
  • Network Security Administration
  • Response Management
Find out additional details about Progent's CISM Certified Security Engineering Expertise.

CISSP Qualified Security Engineering Expertise
The CISSP credential denotes mastery of an international standard for data security. ANSI has granted certification accreditation in the field of information security defined by ISO 17024. Progent can provide the services of security consultants who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified expert to help your enterprise in a broad range of security fields such as:

  • Security Administration Procedures
  • Security Architecture and Models
  • Access Control Systems and Methodology
  • Applications Development Security
  • Secure Operations
  • Site Security
  • Data Encryption Technology
  • Telecom, LAN and WAN Security
  • Business Continuity Planning
Find out additional information concerning Progent's CISSP Security Engineering Expertise.

ISSAP Qualified Secure IT Architecture Engineering Assistance
Progent's ISSAP qualified system architecture engineers are consultants who have earned ISSAP Certification as a result of rigorous testing and extensive experience with network security architecture. The ISSAP certification indicates demonstrated competence in the more in-depth requirements of information system security architecture bounded by the broader field of IS security knowledge needed for CISSP accreditation. Progent's ISSAP-qualified security experts can assist your company with all aspects of architecture security including.

  • Access Management Mechanisms and Methodologies
  • Telecommunications and Network Infrastructure Protection
  • Cryptography Options
  • Requirements Analysis and Security Standards
  • BCP and Disaster Recovery Planning
  • Physical Security
Find out additional details concerning Progent's ISSAP Certified Secure Network Architecture Engineering Professionals.

CISA Accredited IS Security Auditing Consulting Services
The Certified Information Systems Auditor accreditation is a prestigious qualification that indicates expertise in network security auditing. Accredited by the American National Standards Institute (ANSI), the CISA credential requires that consultants pass an extensive test administered by the ISACA international professional association. Progent's CISA network security audit experts are available to help your company in the areas of:

  • IS Audit Services
  • IT Administration
  • Network Assets and Infrastructure Lifecycle Planning
  • Information Technology Support
  • Safeguarding Data Assets
  • Business Continuity Planning
Find out the details concerning Progent's CISA Certified Information System Security Auditing Consulting Support.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC program was initiated by ISACA to validate a consultant's skills to design, deploy, and maintain information system control mechanisms to mitigate risk. Progent can provide the expertise of a CRISC-certified consultant to help your company to develop and execute a workplace continuity or disaster recovery strategy based on leading practices promoted by CRISC and crafted to match your organization's risk tolerance, business goals, and IT budget. Progent's CRISC-qualified IT risk management consultants offer a range of risk identification services such as:

  • Gather data and study documentation to evaluate significant risk scenarios
  • Identify legal, industry, and business mandates and company standards related to your network to determine their possible impact on your strategic objectives
  • Point out possible threats for your business processes to help in evaluating your corporate risk
  • Develop a risk awareness initiative and provide training to make sure your organization understand IS risk so they can contribute to your risk management program
  • Connect identified risk scenarios to related operational procedures to help assign risk responsibility
  • Validate risk tolerance with your senior management and key stakeholders to make sure they match
Read additional details about Progent's CRISC Consultants.

GIAC Qualified Security Engineering Assistance
Global Information Assurance Certification was founded in 1999 to validate the skill of IT security experts. GIAC's goal is to ensure that an accredited security consultant possesses the skills necessary to provide services in critical categories of network, information, and application security. GIAC accreditations are acknowledged by businesses and institutions throughout the world including and the United States National Security Agency (NSA). Progent's GIAC information security audit consultants can assist your IT organization with:

  • Assessing Security Systems
  • Incident Response
  • Intrusion Detection
  • Web-based Services Security
  • SIEM solutions
Learn more details about Progent's GIAC Information Assurance Expertise.

Get in Touch with a Certified Security Specialist
To see how you can access a certified Progent security engineer for online or onsite expertise in Connecticut, call 1-800-993-9400 or go to Remote Network Help.














© 2002- 2018 Progent Corporation. All rights reserved.