Company information networks in the state of New York now have quick and affordable online technical support from Progent's certified security support specialists to resolve complex security problems. The cost is competitive, charges are by the minute, sign-up is quick, and service is world class. Progent also provides assistance for complex engagements that demand the expertise of senior security consultants with top industry certifications.

In case your New York small business is situated some distance from larger metropolitan neighborhoods including New York City, Buffalo, Rochester, Yonkers, or Syracuse, the availability of local qualified security experts may be limited when you have a crisis. This can result in lost revenue for your company, upset clients, unproductive employees, and defocused executives. By contacting Progent's remote support, you have access to a qualified security professional ready to deliver assistance whenever you need it to get your system running and recover your information.

Progent can help you in a variety of ways in your efforts to protect your information system with services that ranges from network security assessments to creating a company-wide security strategy. Progent provides affordable support to assist small and midsize companies to set up and maintain safe networks based on Windows and Cisco products and that may include servers and desktops based on UNIX, Linux, Sun Solaris, or Mac OS X platforms plus BYOD users with Apple iOS iPhones and iPads or Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam filtering and defense against e-mail-based attacks. Email Guard is Progent's email filtering and encryption solution that uses the technology of top information security companies to deliver centralized control and comprehensive protection for all your email traffic. The powerful structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with an on-premises security gateway appliance to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne threats. ProSight Email Guard's Cloud Protection Layer serves as a first line of defense and blocks the vast majority of threats from reaching your network firewall. This decreases your vulnerability to inbound threats and saves system bandwidth and storage. ProSight Email Guard's on-premises security gateway appliance adds a deeper level of analysis for inbound email. For outgoing email, the local security gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The local security gateway can also help Microsoft Exchange Server to monitor and safeguard internal email that stays within your security perimeter.

Progent's security engineers are available remotely or on site to offer a range of urgent or longer-term IT security services such as:

  • Perform extensive network security audits
  • Recuperate quickly after virus and worm attacks
  • Install and troubleshoot firewalls
  • Implement secure solutions for offsite and mobile connectivity
  • Install advanced solutions for defense against spam and directory harvest attacks
  • Develop a comprehensive security strategy with 24x7 monitoring
  • Provide comprehensive Call Center Support
  • Develop an effective data backup and disaster recovery strategy based on Data Protection Manager backup/restore capability
If your network has an emergency requirement for computer security support, go to Progent's Emergency Remote Network Help.

Progent's engineers can deliver world-class services in vital areas of system security including analysis, firewall and VPN solutions, and advanced security consulting.

System Assessment
Progent's expert security consultants can assess the effectiveness of your existing network security implementation through comprehensive remote automated testing based on advanced utilities and tested techniques. Progent's skill in administering this testing saves your company time and money and offers an accurate picture of system vulnerability. The information your company gains can form the basis of a network protection plan that can permit your network to run safely and respond rapidly to future risks.

Automated Network Security Evaluation
Progent provides expertise in the use of security testing products such as Microsoft's MBSA and GFI LANguard Network Security Scanner for economically running a set of automatic system auditing checks to uncover potential security vulnerabilities. Progent has extensive experience with additional network auditing utilities including NMAP, AMAP Application Scanner, eEye, plus utilities like Metasploit Framework, Hydra, and Nikto. Progent can help you to understand testing reports and respond appropriately.

Progent can help you design security into your business processes, install auditing tools, plan and implement a secure system environment, and suggest procedures to maximize the security of your network. Progent's security engineers are ready to assist you to configure a firewall, implement safe remote connectivity to email and business applications, and integrate virtual private network. Learn more concerning Progent's network security assessment.

Security Inventory and Evaluation Packages for Small Businesses
Progent has put together two low-cost security inventory service bundles intended to allow small businesses to get an impartial network security assessment from a qualified security specialist. With Progent's External Security Inventory Scan, a security expert administers an extensive test of your IT infrastructure from outside your firewall to uncover possible risks in the security posture you expose to the outside world. With Progent's Internal Network Security Inventory Scan, a security expert executes a network scan from an authorized computer inside your firewall to determine vulnerabilities to internal attacks. The two security inventory packages are configured and run from a secured external location. The process is directed by a consultant who has earned high-level security accreditations and who generates a document that summarizes and interprets the information captured by the scan and proposes cost-effective remediation where appropriate.

Network Penetration Analysis Consulting
Stealth intrusion testing is an important part of any serious IT system security strategy. Progentís security professionals can perform thorough intrusion checks without the knowledge of your company's internal network support staff. Stealth penetration testing uncovers whether current security defense tools such as intrusion detection alerts and event log analysis are properly set up and consistently checked. Find out more on Progent's stealth security penetration testing consulting.

Firewall and Virtual Private Network Solutions
Progent's expertise in network security technology encompasses in-depth field work with leading firewalls and Virtual Private Network products from a variety of vendors including Cisco, Microsoft, and CheckPoint. Progent can provide the support of engineers with key networking certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Configuration and Troubleshooting
The new ASA 5500-X Family Next-Generation Firewalls with Firepower Services deliver significantly more performance than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new installations. Since Cisco's acquisition of Sourcefire, the whole line of ASA 5500-X devices can be provisioned to support Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed intrusion protection system. Firepower services bring powerful new features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can assist you to maintain your legacy PIX or ASA 5500 firewalls and upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your organization to plan, deploy, optimize, administer and troubleshoot firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Read additional information about Cisco ASA 5500-X Firewalls with Firepower Services integration and troubleshooting support.

Cisco Network Security and Virtual Private Network Consulting Expertise
Cisco's security and remote connection technology represent a comprehensive line of manageable security products to help safeguard your local and remote network infrastructure. Cisco's VPN product family includes switches, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's professional consulting staff includes field-proven specialists with Cisco's CCIE and CCNP qualifications who are able to assist your organization to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that align best with your business goals. Learn additional details about Progent's Consulting Expertise for Cisco Security Technology and VPN Appliances.

Consulting Services for Additional Firewall and Virtual Private Network Products
Progent offers small and mid-size businesses professional support for Intrusion Protection Systems and IPsec VPN products from major firewall and Virtual Private Network security companies including WatchGuard, Juniper Networks, and SonicWALL. Progent can show you how to design a comprehensive security plan and choose appropriate technologies from a variety of vendors to support your security objectives while sticking within your budget limits.

Progent's Low-Cost Managed Services for Information Security
Progent offers a collection of low-cost, set-price monthly services designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. Managed services offered by Progent include:
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email security platform that incorporates the technology of leading data security companies to provide web-based management and world-class protection for your inbound and outbound email. The powerful structure of Progent's Email Guard integrates cloud-based filtering with an on-premises gateway appliance to provide advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. ProSight Email Guard's Cloud Protection Layer serves as a first line of defense and blocks most threats from reaching your network firewall. This reduces your exposure to inbound attacks and conserves network bandwidth and storage space. ProSight Email Guard's on-premises gateway appliance adds a further level of inspection for incoming email. For outgoing email, the onsite security gateway offers AV and anti-spam protection, DLP, and email encryption. The on-premises gateway can also help Microsoft Exchange Server to monitor and protect internal email traffic that stays inside your corporate firewall. Learn more about Progent's ProSight Email Guard Spam Filtering, Virus Blocking, Email Content Filtering and Data Loss Protection.

ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection service that incorporates next generation behavior-based machine learning technology to defend endpoint devices and physical and virtual servers against new malware assaults like ransomware and file-less exploits, which routinely evade legacy signature-based anti-virus tools. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and offers a unified platform to automate the complete malware attack progression including filtering, infiltration detection, mitigation, remediation, and forensics. Key capabilities include single-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against newly discovered attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) Endpoint Protection and Ransomware Defense.

ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services offer small and medium-sized organizations an affordable and fully managed service for reliable backup/disaster recovery. For a fixed monthly rate, ProSight DPS automates your backup processes and enables fast recovery of critical data, apps and virtual machines that have become unavailable or corrupted due to hardware failures, software bugs, natural disasters, human mistakes, or malware attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images, plus Hyper-V and VMware images. Critical data can be protected on the cloud, to a local device, or to both. Progent's backup and recovery consultants can deliver advanced support to set up ProSight Data Protection Services to to comply with government and industry regulatory requirements like HIPPA, FIRPA, and PCI and, when necessary, can help you to restore your business-critical data. Read more about ProSight Data Protection Services Managed Cloud Backup.

Expert Network Security Consulting
Any company should develop a carefully thought out security strategy that incorporates both proactive processes and reaction plans. The proactive plan is a collection of steps designed to reduce vulnerabilities. The reactive plan helps your company's IT security engineers to evaluate the impact caused by a security penetration, repair the damage, document the experience, and get the IT network operational as soon as feasible.

Progent's certified IS security consultants are available to assist you to perform a full risk evaluation and define a company-wide security plan to implement security processes and controls to minimize ongoing attacks and threats.

CISM Qualified System Security Engineering Services
The Certified Information Security Manager (CISM) committee defines the core competencies and worldwide standards of performance that IT security professionals are expected to master. It gives business management the confidence that consultants who have qualified for their CISM credential possess the background and knowledge to deliver effective security management and support services. Progent can provide the services of CISM certified security consultants to assist companies with:

  • IS Security Strategies
  • Vulnerability Management
  • Network Security Program Management
  • IS Security Management
  • Recovery Planning
Read more details about Progent's CISM Qualified IS Security Support Expertise.

CISSP Certified Security Consulting Assistance
CISSP recognizes mastery of a worldwide standard for network security. ANSI (American National Standards Institute) has awarded certification recognition in the field of data security under ISO/IEC 17024. Progent can provide the services of security consultants who have earned CISSP certification. Progent can give you access to a CISSP-certified expert to help your business in a broad range of security fields including:

  • Security Management Procedures
  • Security Infrastructure and Paradigms
  • Access Management Systems and Methodology
  • Software Development Security
  • Secure Operations
  • Site Security
  • Encryption/Decryption Mechanisms
  • Telecommunications, LAN and WAN Security
  • Disaster Recovery Preparedness
Read additional details about Progent's CISSP Network Security Engineering Services.

ISSAP Certified Secure Network Architecture Consulting Expertise
Progent's ISSAP certified IT architecture professionals are consultants who have been awarded ISSAP status as a result of thorough examination and significant experience with network security architecture. The ISSAP credential indicates demonstrated skill in the more challenging demands of information security architecture bounded by the wider field of IS security expertise required for CISSP accreditation. Progent's ISSAP-qualified security consultants can assist your business with all aspects of architecture security including.

  • Access Management Mechanisms and Techniques
  • Telecommunications and Network Infrastructure Protection
  • Data Encryption Options
  • Requirements Analysis and Security Guidelines
  • Business Continuity Planning and Disaster Recovery Planning (DRP)
  • Hardware Security
Read more details about Progent's ISSAP Qualified Secure Network Architecture Engineering Expertise.

CISA Certified Network Security Auditing Consulting Assistance
The Certified Information Systems Auditor (CISA) accreditation is a globally recognized qualification that indicates expertise in IS security audit and control. Certified by the American National Standards Institute (ANSI), the CISA credential requires that consultants pass a comprehensive examination administered by the ISACA professional association. Progent's CISA-qualified security audit specialists can help your company with:

  • Information Systems Audit Services
  • IT Administration
  • Network Assets and Infrastructure Lifecycle
  • Information Technology Service Delivery
  • Safeguarding Information Resources
  • Disaster Recovery Preparedness
Get the details about Progent's CISA Accredited IS Security Auditing Engineering Services.

CRISC Experts
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA in 2010 to validate a consultant's ability to plan, implement, and maintain information system controls to reduce risk. Progent offers the expertise of a CRISC-certified consultant to help you to develop and carry out a business continuity plan that follows leading practices promoted by CRISC and crafted to align with your organization's risk tolerance, business objectives, and IT budget. Progent's CRISC-certified IT risk management consultants offer a variety of risk assessment services including:

  • Collect information and review documentation to help identify major risk scenarios
  • Identify statutory, regulatory, and contractual requirements and company policies associated with your information system to determine their potential impact on your business objectives
  • Point out potential vulnerabilities for your business processes to help in analyzing your enterprise risk
  • Develop a risk awareness program and provide training to make sure your stakeholders appreciate IT risk so they can assist with your risk management process
  • Match identified risk vectors to your associated operational processes to help determine risk responsibility
  • Determine risk appetite with your senior leadership and major stakeholders to make sure they are in agreement
Read additional information concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Certified Information System Security Consulting Services
GIAC (Global Information Assurance Certification) was established in 1999 to validate the skill of computer security professionals. GIAC's goal is to make sure that a certified security consultant possesses the skills appropriate to deliver services in critical categories of system, information, and application software security. GIAC certifications are recognized by businesses and institutions around the world including and the U.S. NSA. Progent's GIAC-certified network security audit experts are available to assist your IT organization with:

  • Auditing Security Systems
  • Security Incident Response
  • Intrusion Detection
  • Web-based Application Security
  • SIEM solutions
Learn more information about Progent's GIAC Information Assurance Expertise.

Contact a Certified Security Engineer
To see how you can access a security engineer for remote or on-premises help in New York, call 1-800-993-9400 or go to Online Computer Support.

© 2002- 2018 Progent Corporation. All rights reserved.