Small business computer networks in New Jersey can depend on prompt and economical online access to Progent's qualified network security engineers to assist with urgent security issues. The cost is competitive, billing is per minute, sign-up is immediate, and service is world class. Progent also offers help for complex projects that requires the knowledge of senior security engineers with high-level security credentials.

If your New Jersey small business is situated far from more populated metropolitan areas such as Newark, Jersey City, Paterson,or Elizabeth, help from nearby accredited security consultants may be problematic when you have a crisis. This could mean lost productivity for your company, angry customers, idle workers, and defocused executives. By utilizing Progent's remote support, you have access to a qualified security professional who can deliver assistance whenever you need it to keep your computer network operating and restore your data.

Progent can assist you in a variety of ways in your efforts to protect your IT environment with support services ranging from security checks to creating a comprehensive security plan. Progent offers affordable service to help businesses of all sizes to design and maintain secure networks based on Windows and Cisco technology and that may include servers and desktops running UNIX or Linux platforms as well as BYOD users with Apple handhelds or Google Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam filtering and defense against email-borne assaults. Email Guard is Progent's email security solution that incorporates the services and infrastructure of leading information security vendors to provide web-based control and comprehensive protection for your email traffic. The powerful architecture of Progent's Email Guard integrates cloud-based filtering with a local gateway device to offer complete protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne threats. The Cloud Protection Layer serves as a preliminary barricade and keeps most unwanted email from reaching your security perimeter. This decreases your exposure to inbound threats and saves system bandwidth and storage. ProSight Email Guard's onsite security gateway device provides a deeper layer of inspection for incoming email. For outgoing email, the on-premises gateway provides AV and anti-spam filtering, protection against data leaks, and encryption. The local gateway can also help Exchange Server to track and protect internal email that stays within your corporate firewall.

Progent's certified professionals are available remotely or on premises to offer a range of urgent or project-based IT security services which include:

  • Perform extensive network security audits
  • Clean up quickly after attacks
  • Set up firewalls from multiple vendors
  • Implement safe solutions for offsite and mobile access
  • Install effective software for automatic defense against viruses, spam and directory harvest attacks
  • Help create a comprehensive security plan with round-the-clock security monitoring
  • Offer comprehensive Help Desk Support
  • Help Create a practical backup and business continuity plan built around Microsoft Data Protection Manager backup technology
If your network has an urgent need for IT security help, refer to Progent's Emergency Remote Network Help.

Progent's security experts provide world-class support in vital facets of system protection that include security assessment, firewalls and VPN, and advanced security planning.

System Evaluation
Progent's expert security engineers can assess the strength of your current network protection environment through exhaustive remote automated analysis via sophisticated utilities and tested techniques. Progent's skill in administering this service saves you time and money and offers an objective picture of gaps. The information your company gains can be used as the foundation of a security plan that can permit your network to run safely and react quickly to future threats.

Automated Network Security Evaluation
Progent provides consulting in the application of security analysis software including Microsoft Baseline Security Analyzer (MBSA) and LANguard from GFI for economically running a set of automatic system auditing checks to uncover potential security holes. Progent has extensive experience with other security auditing tools such as NMAP, AMAP, eEye, plus utilities such as SolarWinds, Netcat, Socat, and Nikto. Progent can show you how to make sense of audit reports and react appropriately.

Progent can help you build security into your company processes, configure auditing tools, plan and implement a secure system environment, and recommend policies to maximize the security of your network. Progent's security engineers are available to show you how to set up a firewall, implement safe remote connectivity to email and business applications, and integrate VPN. Learn additional information on Progent's automated security assessment.

Security Inventory and Evaluation Packages for Small Businesses
Progent has put together two ultra-affordable security inventory scanning bundles designed to allow small companies to get an objective network security assessment from a certified security engineer. With Progent's External Security Inventory Checkup, an engineer administers an extensive test of your network from beyond your firewall to determine possible risks in the security profile you present to the outside world. With Progent's Internal Network Security Inventory Scan, a certified security professional executes a system scan from an authorized computer inside your firewall to assess vulnerabilities to internal threats. Both security inventory services are set up and run from a protected remote location. The process is managed by a consultant who has earned high-level security credentials and who produces a document that summarizes and interprets the data captured by the scan and proposes cost-effective improvements if appropriate.

Stealth Intrusion Testing Consulting
Stealth penetration checking is an important part of any comprehensive network security strategy. Progentís security experts can run extensive intrusion tests without the knowledge of your company's internal network support resources. Unannounced penetration checking uncovers whether existing security monitoring tools such as intrusion incident alerts and event log monitoring are properly set up and consistently monitored. Find out more about Progent's network penetration testing support services.

Firewall And Virtual Private Network (VPN) Support
Progent's background in network security solutions encompasses extensive field work with leading firewalls and Virtual Private Network (VPN) products from multiple companies including Cisco, Microsoft, and CheckPoint. Progent can provide the support of consultants with important networking certifications including Cisco Certified Internetwork Expert and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Troubleshooting
The current ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide significantly more value than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new deployments. Since Cisco's purchase of Sourcefire, the whole family of ASA 5500-X devices can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the world's most popular network intrusion protection system. Firepower services bring powerful new features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can help your company to maintain your legacy PIX or ASA 5500 firewalls and migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your company to design, deploy, optimize, administer and troubleshoot firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Read more information about Cisco ASA Firewalls with Firepower integration and troubleshooting services.

Cisco Security and Virtual Private Network Engineering Services
Cisco's network security and offsite connection technology provide a complete range of manageable security products to help safeguard your local and remote network infrastructure. Cisco's VPN line features switches, firewalls, intrusion detection systems and VPN concentrators. Progent's professional consulting staff includes experienced engineers with Cisco's Certified Internetwork Expert and CCNP certifications who are able to assist your business to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that fit most closely with your business goals. Read more details concerning Progent's Engineering Services for Cisco Security Solutions and Virtual Private Network Appliances.

Consulting Expertise for Additional Firewall and Virtual Private Network Solutions
Progent offers small and medium size organizations expert support for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and Virtual Private Network security vendors including WatchGuard, Juniper, and Symantec. Progent can show you how to create a comprehensive security plan and select appropriate products from multiple vendors to support your security objectives while staying within your budget restraints.

Progent's Fixed-price Managed Services for Information Security
Progent's value-priced ProSight portfolio of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance. Managed services offered by Progent include:
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email filtering and encryption platform that incorporates the services and infrastructure of leading information security vendors to deliver web-based management and world-class security for all your email traffic. The hybrid structure of Email Guard combines a Cloud Protection Layer with a local security gateway device to provide advanced protection against spam, viruses, Dos Attacks, DHAs, and other email-borne threats. ProSight Email Guard's cloud filter acts as a preliminary barricade and blocks the vast majority of unwanted email from reaching your security perimeter. This decreases your vulnerability to external attacks and saves network bandwidth and storage. ProSight Email Guard's on-premises security gateway appliance provides a further level of analysis for incoming email. For outgoing email, the on-premises gateway provides AV and anti-spam filtering, DLP, and email encryption. The onsite security gateway can also help Microsoft Exchange Server to track and protect internal email traffic that stays within your security perimeter. Find out more about Progent's ProSight Email Guard Spam Filtering, Virus Blocking, Email Content Filtering and Data Leakage Prevention.

ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates next generation behavior-based machine learning technology to guard endpoints and servers and VMs against modern malware attacks like ransomware and file-less exploits, which easily evade traditional signature-based AV tools. ProSight ASM safeguards on-premises and cloud-based resources and provides a unified platform to address the entire threat progression including protection, infiltration detection, containment, remediation, and post-attack forensics. Top features include single-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against newly discovered attacks. Learn more about Progent's ProSight Active Security Monitoring Endpoint Protection and Ransomware Recovery.

ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services offer small and mid-sized organizations a low cost and fully managed solution for secure backup/disaster recovery (BDR). For a low monthly price, ProSight DPS automates your backup activities and enables fast recovery of vital files, apps and virtual machines that have become lost or corrupted due to component failures, software bugs, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware images. Important data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's BDR specialists can deliver world-class expertise to set up ProSight DPS to to comply with regulatory requirements like HIPPA, FINRA, and PCI and, whenever needed, can help you to restore your business-critical information. Read more about ProSight Data Protection Services Managed Cloud Backup.

Certified Security Planning
Any business ought to have a thoroughly thought out security strategy that includes both proactive processes and response plans. The pre-attack plan is a set of mechanisms intended to minimize security weaknesses. The post-attack plan helps your network security personnel to assess the damage resulting from a security penetration, repair the damage, document the event, and get business functions operational as quickly as possible.

Progent's certified information security consultants can to assist you to run a full vulnerability assessment and create a network security strategy to implement security policies and mechanisms to reduce future attacks and threats.

CISM Certified Information Security Support Assistance
The CISM organization defines the core competencies and international standards of performance that information security managers are required to learn. CISM provides executive management the assurance that those who have qualified for their CISM certification possess the background and capability to deliver efficient security management and support services. Progent can provide the support of CISM qualified security professionals to assist companies with:

  • Information Security Governance
  • Risk Analysis
  • Network Security Implementation Management
  • IS Security Management
  • Response Management
Learn more information concerning Progent's CISM Accredited Information Security Engineering Expertise.

CISSP Qualified Security Engineering Support
CISSP certification recognizes mastery of a worldwide standard for network security. ANSI has granted certification recognition in the field of information security defined by ISO 17024. Progent offers the services of security experts who have earned CISSP accreditation. Progent can provide a CISSP-certified professional to help your business in a variety security areas such as:

  • Security Administration Practices
  • Security Architecture and Paradigms
  • Access Control Solutions and Processes
  • Software Development Security
  • Operations Security
  • Physical Security
  • Cryptography Mechanisms
  • Telecommunications, Network and Internet Security
  • Business Continuity Preparedness
Find out additional details about Progent's CISSP Qualified Information Security Engineering Professionals.

ISSAP Accredited Secure IT Architecture Engineering Services
Progent's ISSAP qualified IT architecture engineers are experts who have been awarded ISSAP status through thorough testing and significant work with network security design. The Information System Security Architecture Professional (ISSAP) certification indicates proven mastery in the more in-depth requirements of IS security architecture bounded by the broader field of information security knowledge required for CISSP accreditation. Progent's ISSAP-certified security specialists can help your business with all phases of architecture security such as.

  • Access Management Systems and Techniques
  • Telecom and Network Infrastructure Protection
  • Encryption/Decryption Options
  • Requirements Evaluation and Security Standards
  • Business Continuity Planning and Disaster Recovery Planning
  • Hardware Security
Find out more details about Progent's ISSAP Accredited Secure Information System Architecture Consulting Professionals.

CISA Accredited Security Auditing Engineering Assistance
The Certified Information Systems Auditor accreditation is a prestigious qualification that indicates expertise in network security audit and control. Certified by the American National Standards Institute, the CISA accreditation requires that candidates undergo an extensive test given by the ISACA international professional group. Progent's CISA-qualified security audit specialists are available to assist your IT organization with:

  • Information Systems Audit Process
  • IT Governance
  • Network Assets and Infrastructure Planned Useful Life
  • IT Service Delivery
  • Safeguarding Information Assets
  • Disaster Recovery Planning
Get more information about Progent's CISA Accredited IS Security Auditing Engineering Support.

Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA in 2010 to validate an IT professional's skills to design, deploy, and support information system control mechanisms to mitigate risk. Progent offers the expertise of a CRISC-certified engineer to help you to develop and execute a workplace continuity strategy based on industry best practices promoted by CRISC and crafted to match your company's risk appetite, business goals, and IT budget. Progent's CRISC-qualified network risk mitigation engineers can provide a range of risk identification services including:

  • Gather data and review documentation to help identify major vulnerabilities
  • Identify legal, industry, and business requirements and organizational standards associated with your network to assess their potential influence on your strategic goals
  • Identify possible vulnerabilities for your business processes to assist in evaluating your enterprise risk
  • Create a risk awareness initiative and provide seminars to ensure your organization appreciate IS risk so they can contribute to your risk management program
  • Connect key risk scenarios to your associated business processes to help assign risk responsibility
  • Validate risk appetite with your senior management and major stakeholders to ensure they match
Get the details about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Qualified IS Security Engineering Expertise
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the skill of IT security engineers. GIAC's mission is to ensure that an accredited professional possesses the knowledge needed to provide support in vital areas of network, data, and application program security. GIAC certifications are acknowledged by companies and government organizations around the world including and the United States National Security Agency. Progent's GIAC-qualified IS security audit specialists can assist your IT organization in the areas of:

  • Assessing Networks
  • Incident Handling
  • Intrusion Detection
  • Web Application Security
  • SIEM solutions
Read more details about Progent's GIAC Information Assurance Expertise.

Talk to a Certified Security Specialist
To learn how you can access a certified security consultant for remote or on-premises assistance in New Jersey, call 1-800-993-9400 or go to Remote Network Support.

© 2002- 2018 Progent Corporation. All rights reserved.