Business information networks in the state of New Jersey can now get prompt and economical online access to Progent's certified security experts to help with the toughest security problems. Rates are affordable, billing is per minute, sign-up is quick, and support is unbeatable. Progent also provides assistance for long-term projects that demand the expertise of senior security engineers with top industry credentials.

In case your New Jersey small business is based outside of major urban neighborhoods such as Newark, Jersey City, Paterson,or Elizabeth, the availability of local qualified security consultants is often problematic during a security disaster. This could mean a drop in productivity for your company, angry customers, unproductive workers, and distracted executives. By calling Progent's online services, you can get in touch with a qualified security professional ready to deliver help when you need it to get your information system operating and restore your data.

Progent can assist you in all your initiatives to defend your IT environment with support services that ranges from network security audits to creating a comprehensive security plan. Progent provides affordable support to help small and midsize companies to configure and maintain safe networks based on Windows and Cisco technology and that can include computers based on UNIX or Linux operating systems plus BYOD clients with Apple handhelds or Google Android or Windows Phone devices.

Progent can also show you how to outsource spam blocking and defense against email-borne attacks. Email Guard is Progent's email security platform that incorporates the services and infrastructure of top information security vendors to deliver centralized control and comprehensive security for your inbound and outbound email. The hybrid architecture of Email Guard combines cloud-based filtering with a local gateway device to offer complete defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-based threats. The cloud filter serves as a first line of defense and blocks the vast majority of unwanted email from reaching your security perimeter. This reduces your vulnerability to inbound threats and saves system bandwidth and storage space. ProSight Email Guard's onsite gateway appliance provides a further layer of analysis for incoming email. For outgoing email, the on-premises gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and encryption. The local gateway can also enable Exchange Server to monitor and safeguard internal email that originates and ends within your security perimeter.

Progent's certified experts are accessible remotely or on site to offer a variety of emergency or project-based IT security services including:

If your company has an emergency requirement for IT security help, refer to Progent's Emergency Remote Technical Help.

Progent's engineers provide world-class support in vital fields of network protection that include auditing, firewall and VPN expertise, and high-level security consulting.

System Assessment
Progent's certified security consultants can evaluate the vulnerability of your existing network security systems by performing exhaustive remote automated testing based on sophisticated utilities and proven techniques. Progent's experience in administering this testing saves you money and assures an objective portrayal of gaps. The knowledge your company gains can form the basis of a security plan that can permit your network to run dependably and react rapidly to future threats.

Automated Vulnerability Analysis
Progent provides expertise in the use of security testing products including Microsoft Baseline Security Analyzer and GFI LANguard Network Security Scanner for affordably running a set of automatic network testing checks to identify potential security weaknesses. Progent has broad knowledge of additional security auditing utilities including NMAP, AMAP Application Scanner, eEye, plus tools like SolarWinds, Netcat, Socat, and Nikto. Progent can show you how to make sense of audit reports and respond effectively.

Progent can help you design protection into your business processes, configure auditing tools, plan and deploy a protected network architecture, and suggest policies to maximize the safety of your IT system. Progent's security consultants are able to help you configure a firewall, design secure remote connectivity to email and data, and install virtual private network. Find out additional information about Progent's automated security audits.

Security Inventory Service Bundles for Small Companies
Progent offers two low-cost security inventory scanning packages intended to enable small businesses to get a professional network security evaluation from a certified security consultant. With Progent's External Security Inventory Checkup, a security engineer runs an extensive test of your network from outside your firewall to determine potential risks in the security posture you expose to the public. With Progent's Internal Network Security Inventory Checkup, a certified security professional executes a system scan from an authorized machine inside your firewall to uncover vulnerabilities to inside attacks. Both security inventory services are set up and run from a secured remote site. The process is overseen by an engineer who has earned high-level security accreditations and who produces a report that summarizes and interprets the information captured by the scan and proposes practical remediation where appropriate.

Network Intrusion Testing Consulting
Stealth penetration checking is an important component of any successful IT system security plan. Progentís security professionals can run thorough intrusion checks without the knowledge of your organization's in-house IT resources. Unannounced penetration checking shows whether current security defense systems such as intrusion detection alerts and event log analysis are properly configured and consistently checked. Learn additional information about Progent's network penetration testing support services.

Firewall/VPN Support
Progent's expertise in security solutions includes in-depth field work with leading firewalls and Virtual Private Network (VPN) technology from multiple companies including Cisco, Microsoft, and CheckPoint. Progent offers the services of engineers who have earned important industry certifications such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Debugging
The new ASA 5500-X Series of firewalls with Firepower Services offer significantly more bang for the buck than Cisco's previous firewalls and have replaced the ASA 5500 and PIX firewalls for all new installations. After Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X firewalls can be configured to support Firepower Services, based on Sourcefire's Snort product, which is the market's most popular network intrusion protection system (IPS). Firepower services bring enhanced capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can help your company to maintain your existing PIX or ASA 5500 firewalls and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your organization to plan, integrate, tune, manage and troubleshoot firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Find out more information about ASA Firewalls with Firepower Services configuration and debugging services.

Cisco Network Security and Virtual Private Network Engineering Services
Cisco's network security and remote connection technology provide a comprehensive range of manageable security products to help safeguard your wired and wireless information system. Cisco's Virtual Private Network product family features routers, firewalls, intrusion detection systems and VPN concentrators. Progent's expert staff of consultants includes field-proven specialists with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional certifications who can help your business to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that fit most closely with your company objectives. Learn more details concerning Progent's Engineering Expertise for Cisco Security Technology and VPN Products.

Engineering Services for Additional Firewall and VPN Solutions
Progent provides small and medium size companies professional support for Intrusion Protection Systems and IPsec VPN products from leading firewall and VPN security vendors including WatchGuard, Juniper, and SonicWALL. Progent can help you design a detailed security strategy and choose appropriate technologies from multiple suppliers to achieve your security objectives while sticking within your budget restraints.

Progent's Flat-rate Managed Services for Information Security
Progent's affordable ProSight series of network monitoring and management services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection (EPP) service that utilizes cutting edge behavior-based analysis technology to defend endpoints and servers and VMs against modern malware assaults like ransomware and email phishing, which routinely evade traditional signature-based AV tools. ProSight ASM protects on-premises and cloud-based resources and offers a unified platform to automate the complete threat progression including filtering, detection, mitigation, cleanup, and post-attack forensics. Key capabilities include single-click rollback with Windows Volume Shadow Copy Service and automatic network-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection services deliver economical in-depth security for physical servers and virtual machines, workstations, smartphones, and Exchange email. ProSight ESP uses adaptive security and advanced heuristics for round-the-clock monitoring and responding to security threats from all attack vectors. ProSight ESP delivers firewall protection, penetration alarms, endpoint control, and web filtering through cutting-edge tools incorporated within one agent managed from a single control. Progent's data protection and virtualization consultants can help your business to design and implement a ProSight ESP deployment that meets your organization's unique needs and that allows you demonstrate compliance with government and industry data security regulations. Progent will help you define and implement policies that ProSight ESP will enforce, and Progent will monitor your network and react to alerts that require immediate action. Progent can also assist you to install and verify a backup and disaster recovery system like ProSight Data Protection Services (DPS) so you can recover quickly from a destructive security attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange filtering.

ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services offer small and medium-sized businesses an affordable and fully managed service for secure backup/disaster recovery (BDR). Available at a fixed monthly cost, ProSight Data Protection Services automates and monitors your backup processes and enables rapid restoration of vital files, apps and virtual machines that have become unavailable or damaged due to hardware failures, software glitches, natural disasters, human mistakes, or malicious attacks such as ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware images. Important data can be backed up on the cloud, to a local storage device, or to both. Progent's cloud backup consultants can deliver advanced expertise to configure ProSight DPS to be compliant with government and industry regulatory standards like HIPPA, FIRPA, PCI and Safe Harbor and, when necessary, can help you to restore your critical data. Read more about ProSight DPS Managed Cloud Backup.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the infrastructure of leading data security companies to deliver web-based management and world-class protection for all your inbound and outbound email. The hybrid architecture of Email Guard managed service combines cloud-based filtering with an on-premises gateway appliance to provide complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based threats. The cloud filter acts as a first line of defense and keeps most unwanted email from making it to your security perimeter. This reduces your vulnerability to inbound threats and conserves network bandwidth and storage space. Email Guard's on-premises gateway device adds a deeper level of analysis for incoming email. For outbound email, the local security gateway provides anti-virus and anti-spam protection, DLP, and email encryption. The local security gateway can also assist Microsoft Exchange Server to track and protect internal email that originates and ends within your corporate firewall. For more details, visit Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its key servers and apps hosted in a secure Tier III data center on a high-performance virtual host configured and maintained by Progent's network support experts. With the ProSight Virtual Hosting service model, the client owns the data, the operating system platforms, and the apps. Since the environment is virtualized, it can be moved easily to an alternate hardware environment without a time-consuming and difficult reinstallation procedure. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Learn more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, maintain, retrieve and safeguard information related to your IT infrastructure, procedures, business apps, and services. You can quickly find passwords or serial numbers and be alerted about impending expirations of SSLs or warranties. By updating and organizing your network documentation, you can save up to half of time thrown away looking for vital information about your network. ProSight IT Asset Management includes a common location for holding and collaborating on all documents related to managing your network infrastructure like recommended procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for collecting and associating IT data. Whether youíre planning improvements, doing regular maintenance, or responding to an emergency, ProSight IT Asset Management gets you the data you need when you need it. Find out more about Progent's ProSight IT Asset Management service.

Certified Network Security Design
Every company should develop a thoroughly thought out security strategy that incorporates both proactive processes and response planning. The proactive plan is a collection of procedures designed to reduce vulnerabilities. The reactive plan assists your company's IT security personnel to assess the impact resulting from a security penetration, fix the system, document the experience, and get the IT network running as quickly as possible.

Progent's expert IT security engineers are available to help your business to perform a full vulnerability assessment and define a company-wide security strategy to implement security policies and controls to minimize ongoing attacks and threats.

CISM Qualified System Security Support Assistance
The Certified Information Security Manager (CISM) organization defines the core competencies and global standards of skill that IT security professionals are expected to master. CISM provides executive management the assurance that consultants who have earned their CISM credential have the background and capability to provide effective security administration and consulting consulting. Progent offers the expertise of CISM qualified security professionals to assist businesses with:

  • Information Security Strategies
  • Vulnerability Management
  • Information Security Implementation Management
  • IS Security Administration
  • Response Planning
Learn additional details concerning Progent's CISM Certified IS Security Consulting Expertise.

CISSP Accredited Security Engineering Assistance
CISSP certification recognizes expertise with an international standard for information security. ANSI has granted certification accreditation in the area of data security stipulated by ISO/IEC 17024. Progent can provide access to of security professionals who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified expert to help your enterprise in a broad range of security fields such as:

  • Security Management Procedures
  • Security Architecture and Paradigms
  • Access Management Systems and Methodology
  • Applications Development Security
  • Secure Operations
  • Site Security
  • Encryption/Decryption Technology
  • Telecommunications, LAN and WAN Security
  • Business Continuity Preparedness
Read more information about Progent's CISSP Accredited IS Security Consulting Expertise.

ISSAP Certified Secure Network Architecture Consulting Assistance
Progent's ISSAP certified information system architecture engineers are consultants who have been awarded ISSAP status through rigorous examination and significant work with network security architecture. The ISSAP certification indicates proven mastery in the more challenging demands of information system security architecture within the wider scope of information security expertise required for CISSP accreditation. Progent's ISSAP-qualified security consultants can help your business with all aspects of secure network architecture such as.

  • Access Management Mechanisms and Methodologies
  • Telecom and Network Security
  • Cryptography Solutions
  • Requirements Analysis and Security Standards
  • Business Continuity Planning (BCP) and DRP
  • Physical Security
Read more information about Progent's ISSAP Certified Secure Network Architecture Consulting Services.

CISA Qualified IS Security Auditing Consulting Assistance
The CISA accreditation is an important qualification that represents mastery in information system security audit and control. Certified by the American National Standards Institute, the CISA credential has candidates undergo an extensive examination administered by the ISACA international professional group. Progent's CISA security audit engineers can assist your company in the areas of:

  • IS Audit Process
  • IT Governance
  • Systems and Infrastructure Lifecycle
  • Information Technology Service Delivery
  • Safeguarding Data Assets
  • Disaster Recovery Planning
Get additional information about Progent's CISA Qualified IS Security Auditing Consulting Assistance.

CRISC Experts
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA to verify a consultant's ability to plan, deploy, and support information system controls to mitigate network risk. Progent offers the expertise of a CRISC-certified engineer to help you to develop and execute a workplace continuity plan that follows industry best practices promoted by CRISC and geared to align with your organization's risk appetite, business objectives, and IT budget. Progent's CRISC-certified IT risk management experts offer a variety of risk identification services including:

  • Collect data and review documentation to evaluate significant risk scenarios
  • Identify legal, industry, and contractual mandates and company policies associated with your network to assess their potential impact on your business objectives
  • Point out possible vulnerabilities for your business workflows to assist in analyzing your enterprise risk
  • Develop a risk awareness program and provide training to ensure your stakeholders appreciate IS risk so they can contribute to your risk control process
  • Connect key risk scenarios to related business processes to help determine risk ownership
  • Validate risk tolerance with executive leadership and key stakeholders to ensure they match
Learn more information concerning Progent's CRISC Consultants.

GIAC Certified IS Security Engineering Assistance
Global Information Assurance Certification was founded in 1999 to certify the knowledge of information technology security professionals. GIAC's goal is to assure that a certified professional has the knowledge needed to deliver support in vital categories of network, information, and application security. GIAC certifications are acknowledged by businesses and government organizations throughout the world including and the U.S. NSA. Progent's GIAC IS security audit consultants are available to help your business with:

  • Auditing Security Systems
  • Security Incident Handling
  • Intrusion Detection
  • Web Services Security
  • SIEM solutions
Find out additional details about Progent's GIAC Information Assurance Expertise.

Contact a Certified Security Engineer
To learn how to contact a Progent security consultant for remote or onsite help in New Jersey, call 1-800-993-9400 or go to Online Network Support.














© 2002- 2018 Progent Corporation. All rights reserved.