Small business networks in the state of New York can depend on prompt and affordable online technical support from Progent's accredited network security engineers to fix complex security problems. The cost is competitive, charges are by the minute, engagement is immediate, and service is world class. Progent also provides help for long-term projects that requires the expertise of seasoned security consultants with top security credentials.

If your New York business is situated away from major urban areas such as New York City, Buffalo, Rochester, Yonkers, or Syracuse, access to nearby accredited security experts is often limited during a crisis. This can cause a drop in revenue for your company, upset clients, idle workers, and distracted executives. By utilizing Progent, you can get in touch with a certified security engineer ready to offer expertise whenever you need it to get your information system on line and salvage your information.

Progent can help you in your efforts to defend your IT environment with support services that ranges from network security audits to creating a company-wide security strategy. Progent provides economical service to help businesses of all sizes to design and maintain protected IT environments powered by Windows and Cisco technology and that can include computers based on UNIX, Linux, Solaris, or Apple Mac OS X platforms as well as BYOD clients with Apple iOS iPhones and iPads or Android or Windows Phone handsets.

Progent can also show you how to outsource spam blocking and protection from email-borne attacks. Email Guard is Progent's email security platform that uses the services and infrastructure of top data security companies to deliver web-based management and comprehensive protection for your email traffic. The hybrid structure of Progent's Email Guard managed service combines cloud-based filtering with a local security gateway appliance to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The cloud filter serves as a preliminary barricade and blocks most threats from making it to your network firewall. This reduces your vulnerability to inbound threats and saves system bandwidth and storage space. ProSight Email Guard's onsite gateway device adds a deeper layer of analysis for inbound email. For outgoing email, the onsite gateway offers anti-virus and anti-spam filtering, protection against data leaks, and encryption. The on-premises security gateway can also help Exchange Server to monitor and protect internal email traffic that originates and ends inside your security perimeter.

Progent's certified experts are available remotely or in person to provide a variety of urgent or project-based network security services including:

  • Perform comprehensive security evaluations
  • Recuperate promptly after virus and worm attacks
  • Configure and troubleshoot firewalls
  • Configure secure methods for remote and mobile connectivity
  • Install advanced utilities for automatic defense against spam and DHAs
  • Help create a company-wide security plan with 24x7 network monitoring
  • Provide outsourced Call Center Services
  • Help Create an effective network backup and business continuity plan centered on Microsoft DPM automated backup technology
If your business has an emergency need for computer security help, refer to Progent's Emergency Online Network Support.

Progent's support professionals can deliver world-class support in key areas of system security that include analysis, firewall and VPN solutions, and high-level security planning.

System Evaluation
Progent's expert security consultants can evaluate the vulnerability of your existing computer protection systems by performing comprehensive remote automated testing based on advanced software tools and tested procedures. Progent's experience in this testing saves your company money and offers an objective portrayal of weaknesses. The knowledge your company is provided can make up the basis of a security plan that can permit your information system to operate safely and adapt rapidly to new risks.

Automated Network Vulnerability Assessment
Progent offers expertise in the application of security evaluation utilities including MBSA and GFI LANguard for affordably performing a set of automatic network testing scans to identify potential security problems. Progent has broad knowledge of additional security auditing tools such as NMAP Port Scanner, AMAP Application Scanner, eEye Vulnerability Scanner, as well as tools such as SolarWinds, Netcat, Hydra, and Nikto. Progent can help you to make sense of audit reports and respond appropriately.

Progent can help you design protection into your company operations, install scanning tools, plan and deploy a protected network environment, and suggest policies to maximize the security of your IT system. Progent's security consultants are able to show you how to set up a firewall, design safe remote access to email and data, and integrate VPN. Learn more about Progent's network security audits.

Security Inventory Packages for Small Businesses
Progent has put together two ultra-affordable security inventory service bundles designed to enable small companies to receive an independent network security evaluation from an accredited security expert. With Progent's External Network Security Inventory Checkup, a security expert administers an extensive test of your IT infrastructure from beyond your company firewall to uncover potential weaknesses in the security posture you present to the outside world. With Progent's Internal Security Inventory Checkup, an engineer executes a network scan from a secure machine within your company firewall to uncover your exposure to internal threats. Both security inventory packages are configured and run from a secured remote site. The project is overseen by an engineer who has earned high-level security credentials and who produces a report that summarizes and interprets the information collected by the scan and proposes practical remediation if called for.

Network Security Penetration Testing Consulting
Stealth intrusion testing is a key part of any comprehensive network security strategy. Progentís security experts can perform thorough penetration checks without the awareness of your company's internal IT staff. Stealth penetration testing uncovers whether current security defense tools such as intrusion incident alerts and event history analysis are correctly configured and actively checked. Learn additional information concerning Progent's network security penetration analysis consulting.

Firewalls and VPN Solutions
Progent's background in security solutions includes in-depth familiarity with leading firewalls and Virtual Private Network products offered by multiple companies such as Cisco, Microsoft, and Symantec. Progent can provide the support of consultants who have earned important networking accreditations including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Integration and Debugging
The current Cisco ASA 5500-X Family of firewalls with Firepower Services provide significantly more performance than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new installations. Since Cisco's purchase of Sourcefire, the whole line of ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort product, which is the world's most popular intrusion protection system. Firepower services bring powerful new capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network consultants can assist your company to maintain your current PIX or Cisco ASA 5500 security appliances and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can help you to plan, deploy, optimize, manage and debug firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. See more information about Cisco ASA Firewalls with Firepower Services configuration and troubleshooting services.

Cisco Network Security and Virtual Private Network Consulting Expertise
Cisco's security and offsite access technology offer a full line of easy-to-administer security solutions to help protect your wired and wireless network infrastructure. Cisco's VPN line includes routers, firewalls, intrusion detection systems and VPN appliances. Progent's expert consulting staff includes field-proven engineers with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional certifications who are able to assist your organization to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that align best with your business goals. Learn more details concerning Progent's Consulting Services for Cisco Security and Virtual Private Network Appliances.

Engineering Services for Other Firewall and Virtual Private Network Products
Progent provides small and medium size businesses professional support for Intrusion Protection products and IPsec VPN solutions from major firewall and VPN security companies such as WatchGuard, Juniper Networks, and Symantec. Progent can show you how to design a detailed security strategy and select appropriate products from a variety of vendors to support your security goals while sticking within your budget restraints.

Progent's Low-Cost Managed Services for Information Security
Progent's affordable ProSight series of network management outsourcing services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance. ProSight managed services available from Progent include:
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the infrastructure of top information security companies to deliver centralized control and comprehensive security for all your email traffic. The powerful architecture of Email Guard combines cloud-based filtering with a local gateway appliance to provide advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The cloud filter acts as a first line of defense and blocks the vast majority of unwanted email from making it to your security perimeter. This decreases your vulnerability to external threats and saves network bandwidth and storage. Email Guard's onsite gateway device provides a deeper level of inspection for inbound email. For outbound email, the local gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The local gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email traffic that stays within your security perimeter. For more information, visit Email Guard spam filtering and data leakage protection.

ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection (EPP) service that utilizes cutting edge behavior-based analysis tools to guard endpoints as well as physical and virtual servers against modern malware assaults like ransomware and email phishing, which routinely escape legacy signature-matching anti-virus tools. ProSight Active Security Monitoring protects local and cloud-based resources and provides a single platform to address the entire threat lifecycle including blocking, infiltration detection, mitigation, remediation, and forensics. Top capabilities include one-click rollback using Windows Volume Shadow Copy Service and real-time network-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.

ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services provide small and mid-sized organizations an affordable and fully managed solution for secure backup/disaster recovery (BDR). For a low monthly price, ProSight DPS automates your backup processes and enables fast recovery of critical files, apps and VMs that have become unavailable or corrupted due to hardware breakdowns, software bugs, disasters, human error, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, as well as Hyper-V and VMware images. Important data can be protected on the cloud, to an on-promises storage device, or to both. Progent's BDR consultants can deliver world-class expertise to set up ProSight Data Protection Services to to comply with government and industry regulatory standards such as HIPPA, FINRA, PCI and Safe Harbor and, when needed, can help you to recover your business-critical information. Read more about ProSight DPS Managed Backup and Recovery.

ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, update, retrieve and protect data about your network infrastructure, procedures, applications, and services. You can quickly locate passwords or serial numbers and be warned about upcoming expirations of SSL certificates or warranties. By updating and organizing your IT documentation, you can save as much as half of time spent trying to find vital information about your IT network. ProSight IT Asset Management includes a centralized repository for storing and collaborating on all documents required for managing your network infrastructure like recommended procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for collecting and associating IT data. Whether youíre making enhancements, performing maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the knowledge you need when you need it. Find out more about ProSight IT Asset Management service.

Expert Security Planning
Every company ought to have a thoroughly thought out security program that incorporates both pre-attack procedures and reaction plans. The pre-attack strategy is a collection of mechanisms designed to minimize security weaknesses. The post-attack strategy assists your company's IT security engineers to assess the impact resulting from an attack, repair the damage, document the event, and get business functions running as rapidly as feasible.

Progent's expert IS security engineers can to help you to perform a complete risk assessment and create a company-wide security strategy to implement security policies and mechanisms to minimize future attacks and dangers.

CISM Qualified Information Security Engineering Assistance
The Certified Information Security Manager (CISM) committee describes the core capabilities and worldwide standards of performance that information security managers are required to master. It gives executive management the assurance that consultants who have qualified for their CISM credential have the experience and knowledge to provide efficient security management and support consulting. Progent offers the support of CISM certified security professionals to help companies with:

  • Information Security Processes
  • Vulnerability Management
  • IS Security Program Management
  • IS Security Administration
  • Response Management
Learn additional information concerning Progent's CISM Certified Information Security Support Professionals.

CISSP Accredited Security Engineering Services
CISSP certification denotes expertise with an international standard for information security. ANSI has awarded the CISSP credential recognition in the area of information security under ISO 17024. Progent can provide access to of security experts who have qualified for CISSP certification. Progent can provide a CISSP-certified professional to help your company in a variety security areas including:

  • Security Management Procedures
  • Security Architecture and Models
  • Access Control Solutions and Methodology
  • Software Development Security
  • Operations Security
  • Physical Security
  • Cryptography Technology
  • Telecommunications, Network and WAN Security
  • Business Continuity Planning
Learn more details about Progent's CISSP Accredited Information Security Consulting Expertise.

ISSAP Certified Secure System Architecture Consulting Services
Progent's ISSAP qualified IT architecture engineers are experts who have been awarded ISSAP Certification through rigorous testing and extensive experience with information security design. The ISSAP certification indicates demonstrated competence in the more in-depth demands of information system security architecture within the wider field of information security expertise needed for CISSP certification. Progent's ISSAP-certified security consultants can assist your company with all aspects of secure network architecture including.

  • Access Management Systems and Methodologies
  • Telecom and Network Protection
  • Encryption/Decryption Options
  • Requirements Evaluation and Security Guidelines
  • Business Continuity Planning and Disaster Recovery Planning
  • Site Security
Read additional information about Progent's ISSAP Accredited Secure Information System Architecture Support Professionals.

CISA Accredited Security Auditing Consulting Expertise
The CISA accreditation is an important qualification that signifies mastery in IS security auditing. Certified by ANSI, the CISA credential has consultants pass an extensive examination given by the ISACA professional group. Progent's CISA information security audit specialists are available to help your IT organization with:

  • Information Systems Audit Process
  • Information Technology Enforcement
  • Systems and Architecture Lifecycle
  • IT Service Delivery
  • Safeguarding Data Assets
  • Disaster Recovery Planning
Read more details concerning Progent's CISA Qualified Security Auditing Engineering Services.

Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC program was initiated by ISACA to verify a consultant's ability to design, implement, and maintain IS controls to mitigate risk. Progent can provide the services of a CRISC-certified consultant to help you to create and carry out a business continuity or disaster recovery plan based on industry best practices identified by CRISC and geared to match your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC-certified IT risk mitigation specialists offer a range of risk identification services including:

  • Gather information and study documentation to help identify major vulnerabilities
  • Identify statutory, industry, and business mandates and organizational policies related to your information system to assess their potential influence on your strategic objectives
  • Identify possible vulnerabilities for your business processes to assist in evaluating your enterprise risk
  • Create a risk awareness program and provide training to ensure your organization understand information system risk so they can contribute to your risk management program
  • Match key risk scenarios to your associated operational processes to help assign risk ownership
  • Determine risk tolerance with your senior leadership and major stakeholders to ensure they align
Read more information about Progent's CRISC Consultants.

GIAC Accredited Network Security Engineering Assistance
Global Information Assurance Certification was established in 1999 to validate the knowledge of network security engineers. GIAC's mission is to make sure that an accredited security consultant possesses the skills necessary to provide services in important categories of network, data, and application software security. GIAC certifications are acknowledged by businesses and institutions around the world including and the United States National Security Agency. Progent's GIAC information security audit engineers can help your IT organization with:

  • Assessing IT Infrastructure
  • Incident Response
  • Intrusion Detection
  • Web-based Services Security
  • SIEM solutions
Learn more details about Progent's GIAC Information Assurance Expertise.

Get in Touch with a Progent Security Engineer
To see how to access a Progent security consultant for online or onsite support in New York, phone 1-800-993-9400 or visit Online Computer Support.

© 2002- 2018 Progent Corporation. All rights reserved.