Business computer networks in the state of New Jersey can have fast and affordable online technical support from Progent's qualified network security consultants to assist with complex security problems. The cost is affordable, billing is per minute, engagement is fast, and support is unbeatable. Progent also provides assistance for complex projects that demand the knowledge of senior security consultants with top industry credentials.

In case your New Jersey business is far from larger metropolitan neighborhoods such as Newark, Jersey City, Paterson,or Elizabeth, access to local qualified security engineers may be problematic when there's an emergency. This can cause a loss of productivity for your business, angry customers, unproductive workers, and defocused management. By calling Progent's remote support, you have access to a certified security consultant who can offer help when you require it to get your computer network operating and recover your information.

Progent can assist you in a variety of ways in your initiatives to protect your information system with support services that ranges from security assessments to developing a comprehensive security plan. Progent offers affordable support to help businesses of all sizes to set up and maintain secure IT environments based on Windows and Cisco technology and that may include computers running UNIX or Linux operating systems plus mobile users with Apple iOS iPhones and iPads or Google Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam blocking and protection from email-borne security threats. Email Guard is Progent's email filtering and encryption platform that uses the services and infrastructure of top data security vendors to provide centralized control and comprehensive security for your email traffic. The hybrid structure of Email Guard combines cloud-based filtering with a local security gateway appliance to provide advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. ProSight Email Guard's cloud filter serves as a first line of defense and keeps most unwanted email from reaching your network firewall. This decreases your exposure to external threats and conserves network bandwidth and storage. ProSight Email Guard's onsite gateway device provides a further layer of inspection for inbound email. For outbound email, the local gateway provides AV and anti-spam filtering, DLP, and encryption. The onsite gateway can also enable Exchange Server to track and protect internal email traffic that originates and ends within your corporate firewall.

Progent's security engineers are available online or on site to provide a range of emergency or longer-term computer security services including:

If your company has an urgent need for computer security support, refer to Progent's Emergency Online Network Help.

Progent's support professionals can deliver world-class support in vital facets of network security that include security assessment, firewalls and VPN, and advanced security consulting.

System Audits
Progent's certified security engineers can evaluate the strength of your current network protection environment by performing exhaustive remote automated testing based on sophisticated software tools and proven procedures. Progent's skill in this testing saves you consulting fees and assures an accurate portrayal of gaps. The information your IT organization is provided can be used as the basis of a network protection strategy that will permit your network to operate safely and adapt rapidly to new risks.

Automated Network Security Evaluation
Progent provides consulting in the use of security testing utilities such as MBSA and GFI LANguard for economically performing a variety of automatic network testing scans to identify potential security weaknesses. Progent has broad knowledge of additional network analysis tools including NMAP Port Scanner, AMAP application mapper, eEye, as well as utilities such as SolarWinds, Hydra, and Nikto. Progent can show you how to understand audit reports and react appropriately.

Progent can show you how to build security into your business processes, configure scanning tools, plan and deploy a secure network architecture, and recommend policies to optimize the security of your IT system. Progent's security engineers are ready to help you set up a firewall, design secure remote connectivity to email and business applications, and install virtual private network. Learn additional information on Progent's automated security analysis.

Security Inventory Service Bundles for Small Businesses
Progent has put together two ultra-affordable security inventory bundles designed to enable small businesses to get an independent network security evaluation from a qualified security consultant. With Progent's External Network Security Inventory Scan, an engineer runs an extensive test of your IT infrastructure from outside your company firewall to determine possible weaknesses in the security profile you present to the outside world. With Progent's Internal Security Inventory Checkup, a certified security professional runs a system scan from an authorized machine within your company firewall to uncover vulnerabilities to inside threats. Both security inventory services are set up and executed from a secured remote location. The process is overseen by a consultant who has earned top security accreditations and who generates a document that summarizes and analyzes the data collected by the scan and proposes cost-effective improvements where called for.

Network Security Penetration Analysis Consulting
Stealth penetration checking is a key component of any successful network security strategy. Progent’s security experts can perform extensive intrusion checks without the awareness of your organization's internal network support resources. Unannounced penetration checking uncovers whether existing security defense systems such as intrusion incident alerts and event history monitoring are correctly configured and actively checked. Find out more on Progent's network penetration analysis consulting.

Firewalls and VPN Expertise
Progent's expertise in security technology includes extensive familiarity with major firewalls and Virtual Private Network (VPN) products from a variety of companies such as Cisco, Microsoft, and Symantec. Progent can provide the support of consultants with key networking accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Integration and Troubleshooting
The current ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver substantially more bang for the buck than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX 500 firewalls for new installations. Since Cisco's acquisition of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be configured to enable Firepower Services, built on Sourcefire's Snort product, which is the world's most deployed intrusion protection system (IPS). Firepower services bring powerful new features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-qualified CCIE network consultants can help your company to manage your existing PIX or ASA 5500 firewalls or migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite support for ASA 5500-X firewalls with Firepower Services and can help your company to plan, integrate, tune, administer and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Learn more details about ASA Firewalls with Firepower integration and troubleshooting support.

Cisco Security and Virtual Private Network Support Services
Cisco's network security and offsite access technology provide a full line of easy-to-administer security solutions to help safeguard your wired and wireless network infrastructure. Cisco's Virtual Private Network product family includes switches, firewalls, intrusion detection devices and VPN appliances. Progent's expert staff of consultants includes experienced specialists with Cisco CCIE and CCNP qualifications who are able to help your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that align most closely with your company objectives. Learn more information concerning Progent's Support Services for Cisco Security Technology and VPN Products.

Support Services for Additional Firewall and Virtual Private Network Solutions
Progent provides small and mid-size businesses expert support for Intrusion Protection products and IPsec VPN technology from leading firewall and Virtual Private Network security companies such as WatchGuard, Juniper Networks, and SonicWALL. Progent can show you how to design a comprehensive security plan and select the right technologies from a variety of vendors to support your security objectives while sticking within your budget limits.

Progent's Flat-rate Managed Services for Information Security
Progent's value-priced ProSight series of network monitoring and management services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes next generation behavior machine learning tools to guard endpoints and physical and virtual servers against modern malware attacks such as ransomware and file-less exploits, which routinely evade traditional signature-matching AV tools. ProSight ASM protects local and cloud-based resources and provides a single platform to address the complete malware attack progression including filtering, infiltration detection, mitigation, cleanup, and post-attack forensics. Top features include one-click rollback using Windows VSS and real-time system-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection managed services offer affordable multi-layer protection for physical servers and virtual machines, workstations, smartphones, and Microsoft Exchange. ProSight ESP utilizes contextual security and advanced machine learning for continuously monitoring and reacting to cyber assaults from all attack vectors. ProSight ESP delivers firewall protection, intrusion alerts, endpoint control, and web filtering through leading-edge tools incorporated within one agent accessible from a single console. Progent's data protection and virtualization experts can assist you to design and configure a ProSight ESP deployment that meets your organization's specific requirements and that allows you prove compliance with government and industry data protection regulations. Progent will assist you define and implement security policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alarms that require immediate action. Progent can also help you to set up and test a backup and disaster recovery solution like ProSight Data Protection Services so you can get back in business quickly from a potentially disastrous cyber attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Microsoft Exchange email filtering.

ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services provide small and mid-sized businesses a low cost and fully managed service for secure backup/disaster recovery (BDR). Available at a low monthly rate, ProSight Data Protection Services automates your backup activities and allows fast recovery of critical files, applications and VMs that have become lost or corrupted due to component breakdowns, software glitches, disasters, human mistakes, or malware attacks such as ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware images. Critical data can be protected on the cloud, to an on-promises device, or to both. Progent's cloud backup consultants can deliver world-class support to set up ProSight Data Protection Services to be compliant with government and industry regulatory requirements like HIPPA, FIRPA, PCI and Safe Harbor and, whenever needed, can assist you to recover your business-critical information. Read more about ProSight DPS Managed Cloud Backup.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that uses the infrastructure of leading data security vendors to deliver centralized control and world-class protection for all your inbound and outbound email. The powerful architecture of Progent's Email Guard managed service combines a Cloud Protection Layer with a local gateway appliance to offer complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne threats. The Cloud Protection Layer acts as a preliminary barricade and blocks the vast majority of unwanted email from reaching your network firewall. This decreases your vulnerability to inbound threats and saves network bandwidth and storage space. Email Guard's onsite gateway device adds a further layer of analysis for inbound email. For outgoing email, the on-premises security gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The local gateway can also help Exchange Server to track and safeguard internal email traffic that originates and ends within your corporate firewall. For more information, visit ProSight Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and apps hosted in a secure fault tolerant data center on a fast virtual host configured and maintained by Progent's network support professionals. With the ProSight Virtual Hosting model, the customer owns the data, the operating system platforms, and the apps. Since the environment is virtualized, it can be moved easily to an alternate hardware environment without a lengthy and technically risky reinstallation procedure. With ProSight Virtual Hosting, your business is not locked into a single hosting provider. Find out more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, maintain, retrieve and protect information related to your network infrastructure, processes, business apps, and services. You can quickly find passwords or serial numbers and be warned about impending expirations of SSLs ,domains or warranties. By cleaning up and managing your network documentation, you can save as much as 50% of time thrown away looking for vital information about your IT network. ProSight IT Asset Management features a centralized location for storing and sharing all documents required for managing your business network such as standard operating procedures and self-service instructions. ProSight IT Asset Management also supports a high level of automation for gathering and relating IT data. Whether you’re planning improvements, doing maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the information you require as soon as you need it. Find out more about ProSight IT Asset Management service.

Expert Network Security Consulting
Any business should have a carefully thought out security strategy that incorporates both preventive processes and reaction planning. The proactive strategy is a collection of procedures that help to reduce vulnerabilities. The reactive strategy assists your security engineers to assess the damage resulting from a security penetration, repair the damage, record the experience, and get the IT network restored as soon as possible.

Progent's expert IT security engineers can to assist you to run a full vulnerability evaluation and define a computer security plan to implement security policies and mechanisms to minimize ongoing attacks and dangers.

CISM Certified Network Security Support Assistance
The CISM committee defines the core capabilities and international standards of performance that information security managers are expected to master. CISM provides executive management the confidence that consultants who have qualified for their CISM credential possess the background and capability to provide efficient security administration and consulting services. Progent can provide the support of CISM qualified security consultants to help businesses with:

  • Information Security Governance
  • Vulnerability Management
  • IS Security Program Management
  • Network Security Management
  • Recovery Planning
Learn more information concerning Progent's CISM Security Engineering Professionals.

CISSP Certified Security Engineering Expertise
The CISSP credential denotes expertise with a global standard for information security. ANSI has awarded the CISSP credential recognition in the area of data security stipulated by ISO 17024. Progent can provide the services of security consultants who have qualified for CISSP accreditation. Progent can provide a CISSP-certified professional to help your enterprise in a broad range of security fields such as:

  • Security Management Practices
  • Security Architecture and Paradigms
  • Access Control Systems and Processes
  • Software Development Security
  • Operations Security
  • Site Security
  • Data Encryption Technology
  • Telecommunications, Network and WAN Security
  • Disaster Recovery Preparedness
Learn more information about Progent's CISSP Accredited IS Security Engineering Expertise.

ISSAP Certified Secure System Architecture Consulting Assistance
Progent's ISSAP qualified system architecture professionals are consultants who have been awarded ISSAP Certification as a result of rigorous testing and extensive experience with information security design. The Information System Security Architecture Professional (ISSAP) certification indicates proven skill in the more challenging requirements of IS security architecture bounded by the wider field of IS security expertise required for CISSP certification. Progent's ISSAP-certified security consultants can help your business with all phases of architecture security including.

  • Access Control Systems and Techniques
  • Telecom and Network Infrastructure Security
  • Cryptography Options
  • Requirements Evaluation and Security Criteria
  • Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
  • Physical Security
Find out more details about Progent's ISSAP Certified Secure System Architecture Support Expertise.

CISA Qualified Network Security Auditing Consulting Support
The Certified Information Systems Auditor (CISA) credential is an important achievement that represents mastery in IS security audit and control. Certified by ANSI, the CISA accreditation has consultants pass an extensive test given by the ISACA professional group. Progent's CISA-certified IS security audit experts can help your company with:

  • IS Audit Process
  • Information Technology Administration
  • Network Assets and Architecture Lifecycle Planning
  • Information Technology Support
  • Protecting Information Resources
  • Business Continuity Planning
Read additional information about Progent's CISA Accredited Network Security Auditing Engineering Support.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA to validate an IT professional's skills to design, deploy, and support information system control mechanisms to reduce network risk. Progent offers the services of a CRISC-certified engineer to help you to develop and carry out a workplace continuity or disaster recovery strategy based on leading practices promoted by CRISC and geared to match your organization's risk tolerance, business goals, and IT budget. Progent's CRISC network risk management engineers can provide a variety of risk identification services including:

  • Collect data and review documentation to identify major risk scenarios
  • Identify legal, regulatory, and contractual requirements and organizational standards associated with your network to assess their potential influence on your strategic objectives
  • Point out possible vulnerabilities for your business workflows to help in analyzing your enterprise risk
  • Create a risk awareness initiative and provide seminars to ensure your organization understand IT risk so they can contribute to your risk management program
  • Match key risk scenarios to related operational processes to help determine risk responsibility
  • Validate risk tolerance with your senior leadership and major stakeholders to make sure they are in agreement
Find out additional information about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Certified Security Engineering Services
Global Information Assurance Certification was established in 1999 to certify the knowledge of IT security professionals. GIAC's mission is to verify that a certified professional possesses the skills appropriate to deliver services in important areas of system, data, and software security. GIAC certifications are acknowledged by businesses and government organizations throughout the world including and the United States National Security Agency (NSA). Progent's GIAC-certified network security audit engineers are available to help your business in the areas of:

Find out more details about Progent's GIAC Information Assurance Expertise.

Contact a Security Engineer
To find out how you can contact a security consultant for online or on-premises expertise in New Jersey, phone 1-800-993-9400 or go to Online Computer Help.














© 2002- 2018 Progent Corporation. All rights reserved.