Company IT networks in the state of Connecticut can depend on prompt and affordable online technical support from Progent's certified security experts to assist with critical security issues. Rates are competitive, billing is by the minute, sign-up is fast, and service is world class. Progent also offers assistance for complex projects that requires the services of seasoned security engineers with top industry credentials.

If your Connecticut network is based outside of more populated urban neighborhoods including Bridgeport, New Haven, Hartford, or Stamford, support from nearby qualified network security engineers is often problematic during a crisis. This can cause lost productivity for your company, angry clients, idle workers, and distracted executives. By calling Progent, you can get in touch with a qualified security consultant who can deliver help when you require it to get your information system running and salvage your information.

Progent can help you in a variety of ways in your initiatives to guard your IT environment with support services that ranges from security assessments to developing a company-wide security strategy. Progent offers affordable support to help companies of any size to set up and maintain secure networks powered by Microsoft Windows and Cisco technology and that may include computers running UNIX, Linux, Sun Solaris, or Mac OS X platforms plus mobile users with Apple iOS handhelds or Android or Windows Phone handsets.

Progent can also show you how to outsource spam blocking and defense against email-borne assaults. Email Guard is Progent's email security solution that uses the services and infrastructure of leading information security companies to deliver centralized control and world-class security for your email traffic. The hybrid architecture of Email Guard integrates cloud-based filtering with a local gateway appliance to offer advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The cloud filter acts as a preliminary barricade and keeps the vast majority of threats from reaching your network firewall. This decreases your vulnerability to external attacks and saves network bandwidth and storage space. Email Guard's on-premises gateway appliance adds a deeper level of inspection for inbound email. For outbound email, the on-premises gateway offers AV and anti-spam filtering, protection against data leaks, and encryption. The local security gateway can also enable Microsoft Exchange Server to track and protect internal email traffic that stays within your security perimeter.

Progent's security experts are accessible remotely or on site to provide a variety of emergency or project-based network security services including:

If your business has an immediate requirement for IT security support, refer to Progent's Emergency Online Network Help.

Progent's support professionals offer world-class support in key fields of computer security including auditing, firewall and VPN expertise, and advanced security planning.

System Security Evaluation
Progent's expert security engineers can assess the vulnerability of your current network security systems by performing comprehensive remote automated analysis via advanced utilities and proven procedures. Progent's skill in this testing saves you consulting fees and offers an accurate picture of gaps. The knowledge your IT organization gains can be used as the basis of a network protection strategy that will permit your network to operate dependably and adapt quickly to new threats.

Automated Network Vulnerability Audits
Progent offers expertise in the use of security evaluation products including Microsoft Baseline Security Analyzer and GFI LANguard NSS for economically performing a set of automatic network auditing checks to identify potential security weaknesses. Progent has extensive experience with other security auditing utilities including NMAP, AMAP application mapper, eEye Vulnerability Scanner, as well as utilities such as Metasploit Framework, Hydra, and Nikto. Progent can help you to understand testing reports and respond appropriately.

Progent can help you build security into your company operations, configure scanning tools, define and implement a secure system environment, and recommend policies to maximize the safety of your network. Progent's security professionals are ready to show you how to set up a firewall, design secure remote connectivity to email and data, and install virtual private network. Learn more about Progent's network security audits.

Security Inventory Service Bundles for Small Companies
Progent has put together two low-cost security inventory service bundles intended to allow small companies to get a professional network security assessment from an accredited security expert. With Progent's External Security Inventory Checkup, a security expert runs an extensive examination of your IT infrastructure from beyond your company firewall to determine potential risks in the security profile you expose to the public. With Progent's Internal Network Security Inventory Scan, a security expert runs a network scan from an authorized machine inside your firewall to determine the risk to inside threats. The two security inventory services are configured and run from a protected remote location. The process is managed by a consultant with high-level security accreditations and who produces a report that details and interprets the data captured by the security scan and suggests cost-effective remediation where appropriate.

Stealth Intrusion Testing Support Services
Stealth intrusion testing is an important part of any comprehensive network security plan. Progentís security experts can perform thorough penetration tests without the knowledge of your organization's internal network support resources. Unannounced penetration checking shows whether current security defense systems such as intrusion detection warnings and event log monitoring are properly configured and consistently monitored. Find out additional information concerning Progent's network security penetration testing consulting.

Firewall And Virtual Private Network (VPN) Solutions
Progent's expertise in security solutions encompasses in-depth familiarity with leading firewalls and VPN products offered by multiple vendors including Cisco, Microsoft, and Symantec. Progent offers the services of engineers who have earned important industry certifications including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Debugging
The latest generation of ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer significantly more bang for the buck than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX firewalls for all new installations. Since Cisco's purchase of Sourcefire, the whole family of ASA 5500-X firewalls can be provisioned to enable Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed network intrusion protection system. Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can help you to maintain your legacy PIX or Cisco ASA 5500 security appliances or migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite help with ASA 5500-X firewalls with Firepower Services and can help your company to plan, deploy, tune, administer and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Learn additional details about ASA Firewalls with Firepower Services integration and debugging support.

Cisco Security and VPN Engineering Expertise
Cisco's security and remote connection technology represent a complete line of manageable security solutions to help protect your wired and wireless network infrastructure. Cisco's VPN line features routers, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's professional staff of consultants includes experienced engineers with Cisco's CCIE and Cisco Certified Network Professional qualifications who are able to help your business to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that align most closely with your company goals. Find out additional information concerning Progent's Engineering Services for Cisco Security and Virtual Private Network Products.

Support Services for Additional Firewall and VPN Solutions
Progent provides small and medium size organizations professional support for Intrusion Protection Systems and IPsec VPN products from major firewall and Virtual Private Network security companies such as WatchGuard, Juniper, and SonicWALL. Progent can show you how to design a comprehensive security strategy and select appropriate technologies from a variety of vendors to achieve your security goals while sticking within your budget limits.

Progent's Flat-rate Managed Services for Information Assurance
Progent offers a collection of low-cost, fixed-price monthly services designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services available from Progent include:
Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
Email Guard is Progent's email security solution that uses the services and infrastructure of leading information security companies to provide centralized control and world-class security for all your email traffic. The powerful structure of Progent's Email Guard managed service combines a Cloud Protection Layer with a local security gateway appliance to offer complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The cloud filter acts as a preliminary barricade and keeps most unwanted email from reaching your network firewall. This decreases your vulnerability to inbound attacks and saves system bandwidth and storage. Email Guard's onsite gateway device provides a further level of inspection for inbound email. For outgoing email, the on-premises gateway provides anti-virus and anti-spam filtering, DLP, and encryption. The onsite gateway can also help Exchange Server to track and protect internal email traffic that stays inside your security perimeter. Learn more about Progent's Email Guard Spam Filtering, Virus Blocking, Content Filtering and Data Loss Protection.

ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) service that incorporates cutting edge behavior-based machine learning tools to defend endpoint devices as well as physical and virtual servers against new malware assaults such as ransomware and email phishing, which routinely escape legacy signature-matching AV tools. ProSight ASM safeguards local and cloud-based resources and offers a single platform to manage the complete malware attack lifecycle including filtering, detection, containment, cleanup, and forensics. Key features include one-click rollback using Windows Volume Shadow Copy Service and real-time network-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring Endpoint Protection and Ransomware Defense.

ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services offer small and mid-sized businesses a low cost and fully managed service for reliable backup/disaster recovery. For a low monthly price, ProSight DPS automates and monitors your backup activities and allows rapid recovery of critical data, applications and virtual machines that have become lost or corrupted due to hardware breakdowns, software glitches, disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, apps, system images, plus Hyper-V and VMware images. Critical data can be backed up on the cloud, to a local device, or mirrored to both. Progent's cloud backup specialists can deliver advanced expertise to set up ProSight DPS to be compliant with government and industry regulatory requirements such as IPPA, FIRPA, PCI and Safe Harbor and, when necessary, can assist you to recover your business-critical data. Learn more about ProSight Data Protection Services Managed Cloud Backup.

Certified Network Security Planning
Any business should develop a carefully thought out security program that includes both pre-attack procedures and response planning. The proactive plan is a set of procedures designed to minimize vulnerabilities. The post-attack strategy helps your company's IT security engineers to evaluate the impact caused by an attack, fix the damage, document the event, and get the IT network running as soon as possible.

Progent's expert IT security engineers can to assist your company to perform a full vulnerability evaluation and create a computer security strategy to implement security processes and mechanisms to minimize future assaults and dangers.

CISM Accredited Network Security Support Expertise
The CISM organization describes the basic capabilities and international standards of performance that information security professionals are expected to master. CISM provides executive management the confidence that those who have earned their CISM certification possess the experience and capability to deliver effective security administration and consulting services. Progent can provide the expertise of CISM certified security consultants to help businesses with:

  • Network Security Strategies
  • Risk Management
  • Information Security Implementation Management
  • Network Security Administration
  • Response Planning
Learn additional details about Progent's CISM Accredited Information Security Engineering Services.

CISSP Qualified Security Consulting Support
The CISSP credential recognizes expertise with a global standard for network security. ANSI (American National Standards Institute) has granted certification accreditation in the field of information security under ISO 17024. Progent can provide access to of security professionals who have qualified for CISSP certification. Progent can provide a CISSP-certified consultant to help your organization in a broad range of security areas such as:

  • Security Administration Practices
  • Security Infrastructure and Paradigms
  • Access Management Systems and Processes
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Cryptography Technology
  • Telecommunications, LAN and Internet Security
  • Business Continuity Preparedness
Read more information about Progent's CISSP Accredited IS Security Engineering Professionals.

ISSAP Qualified Secure Network Architecture Consulting Services
Progent's ISSAP certified information system architecture professionals are experts who have been awarded ISSAP Certification as a result of rigorous examination and extensive work with information security architecture. The Information System Security Architecture Professional (ISSAP) certification represents demonstrated skill in the most complex demands of information system security architecture bounded by the wider scope of IS security knowledge needed for CISSP certification. Progent's ISSAP-qualified security specialists can help your business with all phases of secure network architecture such as.

  • Access Control Mechanisms and Methodologies
  • Telecom and System Infrastructure Protection
  • Encryption/Decryption Solutions
  • Requirements Analysis and Security Guidelines
  • BCP and Disaster Recovery Planning
  • Physical Security
Learn additional information concerning Progent's ISSAP Qualified Secure Information System Architecture Support Services.

CISA Certified Security Auditing Engineering Assistance
The CISA accreditation is a globally recognized achievement that signifies mastery in information system security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA accreditation has candidates undergo a comprehensive examination given by the ISACA international professional group. Progent's CISA-qualified information security audit experts are available to assist your company in the areas of:

  • Information Systems Audit Process
  • IT Enforcement
  • Systems and Infrastructure Lifecycle
  • Information Technology Service Delivery
  • Safeguarding Information Resources
  • Disaster Recovery Planning
Read additional information about Progent's CISA Certified Security Auditing Consulting Assistance.

Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA to verify a consultant's skills to plan, deploy, and maintain information system control mechanisms to reduce risk. Progent offers the services of a CRISC-certified consultant to assist your company to develop and carry out a workplace continuity strategy based on industry best practices promoted by CRISC and geared to match your company's risk appetite, business goals, and budgetary guidelines. Progent's CRISC-qualified network risk management consultants offer a variety of risk assessment services including:

  • Collect data and study documentation to evaluate significant vulnerabilities
  • Identify statutory, industry, and contractual requirements and company standards associated with your network to determine their possible influence on your strategic goals
  • Identify possible threats for your operational processes to help in analyzing your corporate risk
  • Create a risk awareness program and conduct training to ensure your stakeholders appreciate IT risk so they can assist with your risk control program
  • Connect key risk vectors to your associated business procedures to help determine risk ownership
  • Validate risk appetite with your senior management and major stakeholders to make sure they align
Find out the details about Progent's CRISC Consultants.

GIAC Qualified Information System Security Engineering Assistance
GIAC was founded in 1999 to validate the skill of network security experts. GIAC's mission is to verify that an accredited security consultant has the knowledge needed to deliver services in critical areas of network, data, and application software security. GIAC accreditations are acknowledged by businesses and institutions around the world including and the United States National Security Agency (NSA). Progent's GIAC information security audit engineers can help your IT organization in the areas of:

  • Auditing Networks
  • Security Incident Response
  • Intrusion Detection
  • Web-based Application Security
  • SIEM solutions
Read additional information about Progent's GIAC Information Assurance Support.

Talk to a Security Specialist
To see how to access a security consultant for online or on-premises help in Connecticut, call 1-800-993-9400 or go to Online Network Support.

© 2002- 2017 Progent Corporation. All rights reserved.