Company networks in the state of New Jersey can depend on fast and economical online access to Progent's certified security engineers to resolve critical security issues. The cost is affordable, charges are by the minute, engagement is immediate, and service is world class. Progent also offers assistance for long-term engagements that demand the services of seasoned security consultants with high-level industry certifications.

In case your New Jersey office is situated outside of more populated metropolitan neighborhoods including Newark, Jersey City, Paterson,or Elizabeth, access to local qualified security consultants is often problematic during a security disaster. This can cause a drop in productivity for your business, angry clients, idle employees, and distracted management. By contacting Progent's remote support, you have access to a certified security engineer ready to offer assistance whenever you have to have it to get your information system operating and restore your data.

Progent can assist you at any level in your initiatives to defend your network with support services ranging from network security checks to creating a company-wide security strategy. Progent offers economical support to help small and midsize companies to configure and manage safe IT environments powered by Microsoft Windows and Cisco technology and that can include servers and desktops running UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as mobile clients with Apple handhelds or Google Android or Windows Phone handsets.

Progent can also help you outsource spam filtering and defense against email-borne attacks. Email Guard is Progent's email filtering and encryption solution that incorporates the technology of top data security companies to provide centralized management and comprehensive security for your email traffic. The powerful architecture of Email Guard managed service combines cloud-based filtering with an on-premises gateway appliance to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based threats. ProSight Email Guard's Cloud Protection Layer serves as a first line of defense and keeps the vast majority of threats from reaching your security perimeter. This decreases your vulnerability to external threats and conserves system bandwidth and storage space. ProSight Email Guard's on-premises gateway appliance adds a deeper level of analysis for inbound email. For outbound email, the onsite security gateway provides anti-virus and anti-spam filtering, DLP, and encryption. The on-premises gateway can also help Exchange Server to monitor and safeguard internal email traffic that stays inside your corporate firewall.

Progent's certified engineers are available online or in person to offer a variety of urgent or project-based IT security services which include:

If your network has an urgent need for IT security help, refer to Progent's Urgent Remote Technical Support.

Progent's engineers offer advanced services in vital fields of computer protection that include auditing, firewalls and VPN, and advanced security consulting.

System Security Audits
Progent's expert security consultants can assess the vulnerability of your existing network security systems through exhaustive remote automated testing based on advanced software tools and proven techniques. Progent's experience in this testing saves your company money and assures a detailed picture of system vulnerability. The information your company is provided can make up the basis of a security plan that can permit your information system to operate dependably and react quickly to future risks.

Automated Network Vulnerability Analysis
Progent provides expertise in the use of security analysis software such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard for economically performing a set of automatic system testing scans to uncover possible security holes. Progent has broad knowledge of other network auditing products such as NMAP, AMAP, eEye Vulnerability Scanner, plus tools like SolarWinds, Netcat, Socat, and Nikto. Progent can help you to understand testing reports and respond appropriately.

Progent can help you design security into your business operations, install auditing applications, define and implement a protected network environment, and suggest policies to maximize the safety of your IT system. Progent's security professionals are ready to help you configure a firewall, implement safe remote access to email and data, and integrate VPN. Find out additional information on Progent's network security audits.

Security Inventory and Evaluation Bundles for Small Businesses
Progent offers two ultra-affordable security inventory and evaluation packages intended to allow small companies to receive an impartial network security evaluation from an accredited security specialist. With Progent's External Network Security Inventory Scan, a security engineer administers a comprehensive examination of your IT infrastructure from beyond your company firewall to determine potential weaknesses in the security profile you present to the outside world. With Progent's Internal Network Security Inventory Scan, an engineer executes a system scan from an authorized computer inside your firewall to determine the risk to internal threats. Both security inventory packages are set up and run from a protected remote location. The process is overseen by a consultant who has earned top security accreditations and who generates a report that details and interprets the data captured by the scan and proposes cost-effective improvements if appropriate.

Network Intrusion Analysis Support Services
Stealth penetration checking is a key part of any serious IT system security strategy. Progent’s security experts can perform thorough intrusion checks without the awareness of your organization's internal IT staff. Stealth penetration testing shows whether current security monitoring systems such as intrusion incident alerts and event log monitoring are properly set up and actively monitored. Learn additional information about Progent's stealth penetration analysis consulting.

Firewalls and VPN Solutions
Progent's expertise in security solutions includes extensive familiarity with major firewalls and Virtual Private Network products offered by multiple vendors including Cisco, Microsoft, and Juniper. Progent offers the support of consultants with important industry accreditations such as CCIE and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Integration and Troubleshooting
The current ASA 5500-X Family of firewalls with Firepower Services deliver significantly more performance than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new deployments. Following Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort technology, which is the world's most deployed intrusion protection system (IPS). Firepower services bring powerful new capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can help you to maintain your legacy PIX or Cisco ASA 5500 firewalls and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can help you to plan, configure, tune, manage and troubleshoot firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. See more information about Cisco ASA 5500-X Firewalls with Firepower configuration and debugging services.

Cisco Security and Virtual Private Network Support Expertise
Cisco's security and offsite connection technology represent a full range of manageable security solutions to help protect your local and remote network infrastructure. Cisco's VPN product family features switches, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's expert consulting staff includes field-proven engineers with Cisco Certified Internetwork Expert and Cisco Certified Network Professional qualifications who are able to assist your organization to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that align most closely with your business goals. Read more details about Progent's Support Expertise for Cisco Security Solutions and VPN Products.

Support Services for Other Firewall and VPN Technology
Progent provides small and mid-size businesses expert consulting for Intrusion Protection products and IPsec VPN products from major firewall and VPN security vendors including WatchGuard, Juniper Networks, and SonicWALL. Progent can show you how to design a comprehensive security strategy and select appropriate technologies from a variety of suppliers to achieve your security objectives while sticking within your budget limits.

Progent's Fixed-price Managed Services for Information Security
Progent's value-priced ProSight portfolio of network monitoring and management services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services offered by Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates cutting edge behavior analysis technology to guard endpoints as well as servers and VMs against new malware attacks such as ransomware and file-less exploits, which easily escape traditional signature-based AV tools. ProSight ASM protects local and cloud-based resources and provides a single platform to address the complete threat lifecycle including protection, infiltration detection, containment, remediation, and forensics. Key features include single-click rollback with Windows Volume Shadow Copy Service and real-time system-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection: Unified Endpoint Protection
ProSight Enhanced Security Protection services deliver affordable in-depth security for physical and virtual servers, desktops, mobile devices, and Exchange email. ProSight ESP utilizes adaptive security and advanced machine learning for round-the-clock monitoring and reacting to security assaults from all vectors. ProSight ESP delivers firewall protection, penetration alarms, device control, and web filtering via cutting-edge technologies incorporated within a single agent accessible from a unified console. Progent's security and virtualization consultants can help you to plan and implement a ProSight ESP deployment that meets your organization's specific requirements and that helps you prove compliance with government and industry information protection standards. Progent will help you specify and implement policies that ProSight ESP will manage, and Progent will monitor your network and react to alarms that require immediate attention. Progent can also assist your company to set up and test a backup and restore solution such as ProSight Data Protection Services so you can recover quickly from a destructive cyber attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Microsoft Exchange filtering.

ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services offer small and mid-sized businesses a low cost and fully managed solution for secure backup/disaster recovery (BDR). For a low monthly rate, ProSight Data Protection Services automates and monitors your backup activities and enables rapid restoration of critical files, applications and virtual machines that have become lost or damaged due to hardware failures, software bugs, disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, applications, system images, plus Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to an on-promises storage device, or mirrored to both. Progent's BDR specialists can provide world-class support to configure ProSight DPS to to comply with government and industry regulatory standards such as HIPPA, FINRA, and PCI and, when needed, can assist you to recover your critical information. Find out more about ProSight DPS Managed Backup.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the technology of top information security companies to provide centralized management and world-class security for your email traffic. The hybrid structure of Email Guard managed service combines cloud-based filtering with a local security gateway device to provide advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based malware. Email Guard's cloud filter serves as a first line of defense and keeps most unwanted email from reaching your network firewall. This reduces your vulnerability to inbound attacks and saves system bandwidth and storage. Email Guard's on-premises security gateway appliance adds a deeper layer of inspection for inbound email. For outgoing email, the local gateway offers AV and anti-spam filtering, DLP, and email encryption. The onsite gateway can also assist Microsoft Exchange Server to track and protect internal email traffic that originates and ends within your corporate firewall. For more details, visit Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its key servers and apps hosted in a protected fault tolerant data center on a fast virtual host configured and managed by Progent's network support professionals. With the ProSight Virtual Hosting model, the customer retains ownership of the data, the OS software, and the applications. Since the environment is virtualized, it can be ported immediately to an alternate hosting environment without requiring a lengthy and technically risky configuration process. With ProSight Virtual Hosting, you are not tied a single hosting provider. Learn more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, update, retrieve and protect data related to your IT infrastructure, processes, applications, and services. You can instantly find passwords or serial numbers and be warned about upcoming expirations of SSLs ,domains or warranties. By updating and managing your IT documentation, you can save up to 50% of time thrown away trying to find vital information about your network. ProSight IT Asset Management includes a common location for storing and collaborating on all documents related to managing your network infrastructure like standard operating procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and associating IT data. Whether you’re making enhancements, performing regular maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the knowledge you require when you need it. Find out more about Progent's ProSight IT Asset Management service.

Certified Security Planning
Every company ought to have a carefully thought out security strategy that includes both proactive procedures and reaction planning. The pre-attack strategy is a set of mechanisms intended to reduce vulnerabilities. The reactive strategy helps your company's IT security engineers to evaluate the impact caused by a security penetration, fix the network, record the event, and get business functions restored as rapidly as feasible.

Progent's expert information security engineers can to help you to run a complete risk evaluation and create a company-wide security strategy to establish security processes and mechanisms to reduce future attacks and dangers.

CISM Qualified System Security Engineering Assistance
The CISM committee describes the basic capabilities and global standards of skill that information security managers are required to master. CISM gives executive management the assurance that those who have qualified for their CISM certification have the background and knowledge to provide effective security administration and consulting consulting. Progent can provide the support of CISM qualified security consultants to help businesses with:

  • IS Security Governance
  • Vulnerability Management
  • Information Security Program Management
  • Information Security Administration
  • Recovery Planning
Learn more details about Progent's CISM Qualified Security Consulting Professionals.

CISSP Qualified Security Consulting Services
CISSP denotes mastery of a worldwide standard for network security. ANSI (American National Standards Institute) has awarded the CISSP credential recognition in the field of data protection stipulated by ISO 17024. Progent can provide the services of security experts who have earned CISSP accreditation. Progent can give you access to a CISSP-certified professional to help your enterprise in a variety security fields such as:

  • Security Management Practices
  • Security Infrastructure and Paradigms
  • Access Control Systems and Methodology
  • Software Development Security
  • Secure Operations
  • Physical Security
  • Data Encryption Technology
  • Telecommunications, LAN and WAN Security
  • Business Continuity Planning
Read additional information concerning Progent's CISSP-certified Cybersecurity Consulting Expertise.

CISSP-ISSAP Certified Secure Network Architecture Engineering Support
Progent's CISSP-ISSAP certified network architecture professionals are consultants who have earned ISSAP Certification through thorough examination and extensive work with network security design. The ISSAP credential represents demonstrated competence in the most challenging demands of information system security architecture bounded by the broader field of IS security expertise required for CISSP accreditation. Progent's ISSAP-certified security consultants can assist your company with all aspects of architecture security including.

  • Access Management Mechanisms and Methodologies
  • Phone System and Network Security
  • Cryptography Options
  • Needs Analysis and Security Standards
  • BCP and Disaster Recovery Planning
  • Physical Security
Read more information concerning Progent's ISSAP Accredited Secure Information System Architecture Consulting Expertise.

CISA Accredited IS Security Auditing Consulting Support
The CISA credential is a globally recognized achievement that indicates mastery in information system security audit and control. Accredited by the American National Standards Institute, the CISA accreditation requires that candidates undergo a comprehensive examination administered by the ISACA international professional association. Progent's CISA-certified IS security audit experts are available to assist your business in the areas of:

  • IS Audit Services
  • IT Administration
  • Network Assets and Architecture Planned Useful Life
  • Information Technology Service Delivery
  • Protecting Data Assets
  • Business Continuity Planning
Find out the details about Progent's CISA Certified IS Security Auditing Engineering Support.

CRISC Consultants
The CRISC program was initiated by ISACA in 2010 to verify an IT professional's skills to design, deploy, and maintain IS control mechanisms to mitigate risk. Progent offers the services of a CRISC-certified engineer to help you to create and carry out a workplace continuity plan that follows industry best practices identified by CRISC and crafted to match your company's risk tolerance, business goals, and IT budget. Progent's CRISC-qualified network risk mitigation consultants offer a range of risk assessment services such as:

  • Collect data and review documentation to evaluate major vulnerabilities
  • Identify statutory, industry, and contractual mandates and organizational standards associated with your information system to assess their potential influence on your strategic objectives
  • Identify potential threats for your operational processes to assist in evaluating your enterprise risk
  • Develop a risk awareness program and conduct training to ensure your organization appreciate IT risk so they can assist with your risk control program
  • Connect key risk scenarios to related operational processes to help determine risk responsibility
  • Determine risk appetite with your senior leadership and key stakeholders to make sure they are in agreement
Get additional details about Progent's CRISC Risk Management Consultants.

GIAC Certified IS Security Engineering Services
GIAC was founded in 1999 to certify the skill of information technology security engineers. GIAC's goal is to assure that an accredited professional possesses the skills needed to deliver support in vital areas of system, information, and software security. GIAC accreditations are recognized by businesses and institutions all over the world including and the U.S. National Security Agency. Progent's GIAC security audit consultants are available to help your business with:

Find out additional information concerning Progent's GIAC Information Assurance Expertise.

Get in Touch with a Progent Security Engineer
To learn how you can get in touch with a security consultant for online or onsite assistance in New Jersey, call 1-800-993-9400 or go to Online Network Support.














© 2002- 2019 Progent Corporation. All rights reserved.