Business information networks in the state of New York can now get quick and economical remote access to Progent's accredited security professionals to resolve critical security problems. The cost is competitive, billing is per minute, sign-up is quick, and support is unbeatable. Progent also provides help for complex engagements that requires the expertise of senior security engineers with high-level security credentials.

If your New York office is based away from major urban areas like New York City, Buffalo, Rochester, Yonkers, or Syracuse, access to local accredited network security support specialists may be problematic during a security disaster. This can result in lost revenue for your company, upset customers, idle workers, and distracted executives. By calling Progent, you have access to a certified security professional who can provide assistance whenever you require it to keep your information system on line and recover your data.

Progent can assist you at any level in your initiatives to defend your information system with support services that can range from security audits to creating a company-wide security strategy. Progent offers economical support to help small and midsize companies to design and maintain secure networks powered by Microsoft Windows and Cisco products and that can include computers running UNIX or Linux platforms plus BYOD clients with Apple iOS iPhones and iPads or Google Android or Windows Phone devices.

Progent can also help you outsource spam filtering and protection from e-mail-based security threats. Email Guard is Progent's email filtering and encryption platform that uses the services and infrastructure of leading information security vendors to provide web-based management and world-class security for all your inbound and outbound email. The hybrid structure of Email Guard managed service combines cloud-based filtering with a local gateway device to offer advanced protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne malware. The cloud filter acts as a first line of defense and blocks most threats from reaching your security perimeter. This decreases your vulnerability to external threats and saves system bandwidth and storage space. ProSight Email Guard's on-premises gateway device adds a deeper layer of inspection for inbound email. For outgoing email, the local gateway provides AV and anti-spam protection, DLP, and email encryption. The on-premises gateway can also enable Exchange Server to monitor and protect internal email that stays within your corporate firewall.

Progent's certified consultants are available online or on premises to offer a variety of emergency or longer-term IT security services including:

  • Run thorough network security audits
  • Recover quickly after virus and worm attacks
  • Install firewalls from multiple vendors
  • Configure secure techniques for offsite and mobile access
  • Deploy effective solutions for automatic defense against spam and directory harvest attacks
  • Help create a comprehensive security plan with 24x7 monitoring
  • Provide outsourced Help Desk Services
  • Help Create a practical backup and restore strategy based on System Center Data Protection Manager backup/restore capability
If your business has an urgent need for computer security help, go to Progent's Emergency Remote Network Support.

Progent's consultants offer advanced support in vital areas of network protection that include security evaluation, firewall and VPN expertise, and advanced security consulting.

Security Evaluation
Progent's certified security consultants can assess the effectiveness of your current computer security implementation by performing exhaustive remote automated analysis via advanced utilities and tested techniques. Progent's experience in this testing saves your company consulting fees and assures an accurate picture of weaknesses. The information your company is provided can make up the basis of a security plan that will permit your information system to operate safely and respond rapidly to future risks.

Automated Network Security Assessment
Progent offers consulting in the use of security evaluation utilities including MBSA and GFI LANguard NSS for affordably running a set of programmed system auditing checks to uncover possible security gaps. Progent has extensive experience with additional security analysis tools such as NMAP, AMAP Application Scanner, eEye, plus utilities such as SolarWinds, Netcat, and Nikto. Progent can show you how to make sense of audit reports and react effectively.

Progent can show you how to design security into your company processes, install auditing software, plan and deploy a protected system environment, and recommend procedures to optimize the safety of your IT system. Progent's security engineers are available to show you how to set up a firewall, design safe remote connectivity to email and business applications, and install virtual private network. Learn additional information about Progent's automated security analysis.

Security Inventory and Evaluation Packages for Small Businesses
Progent offers two ultra-affordable security inventory scanning bundles designed to allow small businesses to receive an impartial network security evaluation from a certified security engineer. With Progent's External Security Inventory Checkup, a security engineer runs a comprehensive test of your network from beyond your company firewall to determine potential risks in the security profile you expose to the outside world. With Progent's Internal Security Inventory Checkup, a certified security professional runs a system scan from an authorized computer within your company firewall to assess your exposure to internal assaults. The two security inventory services are configured and run from a secured external location. The project is overseen by a consultant with top security accreditations and who produces a report that summarizes and analyzes the information captured by the scan and proposes practical improvements where appropriate.

Network Intrusion Testing Support Services
Stealth penetration checking is a key component of any serious IT system security strategy. Progent’s security experts can perform extensive penetration checks without the awareness of your company's internal IT resources. Stealth penetration checking shows whether existing security monitoring systems such as intrusion detection alerts and event log analysis are properly set up and consistently checked. Learn more about Progent's stealth security penetration testing consulting.

Firewall And Virtual Private Network (VPN) Expertise
Progent's background in security technology encompasses extensive field work with leading firewalls and VPN products from a variety of companies including Cisco, Microsoft, and Symantec. Progent offers the services of engineers who have earned important industry certifications including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Configuration and Troubleshooting
The current Cisco ASA 5500-X Family of firewalls with Firepower Services provide substantially more bang for the buck than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX 500 security appliances for new deployments. After Cisco's purchase of Sourcefire, the entire line of ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed network intrusion protection system (IPS). Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help you to maintain your legacy PIX or Cisco ASA 5500 firewalls and upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite help with ASA 5500-X firewalls with Firepower Services and can help your business to design, integrate, tune, administer and troubleshoot firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Find out more information about ASA 5500-X Firewalls with Firepower Services configuration and troubleshooting services.

Cisco Network Security and VPN Support Services
Cisco's security and offsite access technology provide a complete range of manageable security solutions to help safeguard your local and remote network infrastructure. Cisco's Virtual Private Network product family features routers, firewalls, intrusion detection systems and VPN appliances. Progent's professional staff of consultants includes experienced engineers with Cisco Certified Internetwork Expert and CCNP qualifications who can help your business to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that fit most closely with your company objectives. Read more details about Progent's Engineering Services for Cisco Security Technology and Virtual Private Network Products.

Engineering Expertise for Other Firewall and Virtual Private Network Products
Progent offers small and medium size organizations professional consulting for Intrusion Protection Systems and IPsec VPN technology from major firewall and VPN security companies such as WatchGuard, Juniper, and Symantec. Progent can show you how to create a comprehensive security strategy and choose the right technologies from multiple vendors to achieve your security objectives while sticking within your spending restraints.

Progent's Low-Cost Managed Services for Information Security
Progent's low-cost ProSight series of network management outsourcing services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes cutting edge behavior analysis technology to defend endpoint devices as well as servers and VMs against modern malware assaults like ransomware and email phishing, which routinely evade legacy signature-based anti-virus tools. ProSight ASM safeguards on-premises and cloud resources and offers a unified platform to address the entire malware attack progression including blocking, detection, mitigation, cleanup, and forensics. Key features include one-click rollback with Windows VSS and real-time network-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection: Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection services deliver economical multi-layer protection for physical servers and virtual machines, desktops, mobile devices, and Microsoft Exchange. ProSight ESP utilizes contextual security and modern behavior analysis for continuously monitoring and responding to cyber assaults from all vectors. ProSight ESP provides two-way firewall protection, penetration alerts, endpoint control, and web filtering via cutting-edge tools incorporated within one agent managed from a single console. Progent's data protection and virtualization consultants can assist your business to design and configure a ProSight ESP environment that meets your organization's unique requirements and that allows you achieve and demonstrate compliance with legal and industry data security standards. Progent will assist you specify and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alarms that require immediate attention. Progent's consultants can also assist your company to set up and verify a backup and restore system such as ProSight Data Protection Services (DPS) so you can get back in business quickly from a potentially disastrous cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Exchange email filtering.

ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services from Progent provide small and medium-sized organizations an affordable and fully managed service for secure backup/disaster recovery. For a fixed monthly rate, ProSight DPS automates and monitors your backup processes and allows fast recovery of critical files, apps and virtual machines that have become unavailable or damaged due to hardware breakdowns, software glitches, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware images. Important data can be backed up on the cloud, to an on-promises device, or mirrored to both. Progent's cloud backup consultants can provide advanced support to set up ProSight DPS to be compliant with government and industry regulatory standards like HIPPA, FINRA, and PCI and, whenever needed, can assist you to recover your business-critical data. Learn more about ProSight DPS Managed Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that uses the technology of leading information security companies to provide centralized management and world-class protection for all your inbound and outbound email. The powerful structure of Email Guard managed service integrates a Cloud Protection Layer with a local security gateway device to offer complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based threats. Email Guard's cloud filter acts as a first line of defense and blocks the vast majority of unwanted email from reaching your security perimeter. This reduces your exposure to inbound attacks and saves system bandwidth and storage. Email Guard's onsite gateway device adds a deeper layer of inspection for incoming email. For outbound email, the onsite gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also help Exchange Server to track and safeguard internal email traffic that originates and ends within your security perimeter. For more details, see Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its critical servers and apps hosted in a protected Tier III data center on a fast virtual machine host configured and maintained by Progent's network support experts. Under the ProSight Virtual Hosting model, the customer retains ownership of the data, the OS platforms, and the applications. Because the environment is virtualized, it can be moved immediately to a different hosting environment without requiring a time-consuming and technically risky configuration process. With ProSight Virtual Hosting, you are not locked into one hosting service. Find out more about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, maintain, find and protect information related to your network infrastructure, procedures, business apps, and services. You can instantly locate passwords or IP addresses and be alerted automatically about impending expirations of SSLs or warranties. By cleaning up and managing your IT infrastructure documentation, you can save up to half of time thrown away looking for critical information about your network. ProSight IT Asset Management includes a centralized location for storing and collaborating on all documents related to managing your business network such as recommended procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and relating IT data. Whether you’re making improvements, doing regular maintenance, or responding to a crisis, ProSight IT Asset Management delivers the information you require as soon as you need it. Find out more about Progent's ProSight IT Asset Management service.

Expert Network Security Consulting
Every business ought to develop a thoroughly thought out security program that includes both pre-attack processes and response plans. The pre-attack strategy is a set of procedures intended to minimize security weaknesses. The reactive strategy helps your company's IT security engineers to evaluate the damage resulting from an attack, fix the system, record the event, and get business functions operational as soon as possible.

Progent's certified information security consultants are available to help your business to perform a comprehensive vulnerability assessment and create a computer security plan to implement security policies and controls to minimize future attacks and threats.

CISM Accredited Security Engineering Services
The Certified Information Security Manager (CISM) committee describes the basic capabilities and global standards of performance that IT security managers are required to learn. It provides executive management the confidence that consultants who have qualified for their CISM credential possess the background and knowledge to deliver efficient security management and consulting services. Progent offers the support of CISM qualified security professionals to assist companies with:

  • IS Security Processes
  • Risk Management
  • Information Security Implementation Management
  • Information Security Administration
  • Recovery Planning
Read additional details concerning Progent's CISM Certified Information Security Support Expertise.

CISSP Qualified Security Consulting Support
CISSP denotes mastery of an international standard for network security. ANSI (American National Standards Institute) has granted the CISSP credential recognition in the area of information security under ISO 17024. Progent can provide access to of security experts who have qualified for CISSP accreditation. Progent can provide a CISSP-certified consultant to help your organization in a broad range of security areas such as:

  • Security Management Procedures
  • Security Architecture and Paradigms
  • Access Management Solutions and Processes
  • Software Development Security
  • Operations Security
  • Site Security
  • Data Encryption Mechanisms
  • Telecom, LAN and Internet Security
  • Disaster Recovery Planning
Find out additional information about Progent's CISSP Network Security Consulting Services.

ISSAP Certified Secure Network Architecture Engineering Assistance
Progent's ISSAP certified network architecture engineers are consultants who have been awarded ISSAP status as a result of thorough examination and significant work with network security design. The ISSAP credential represents demonstrated skill in the most complex requirements of IS security architecture bounded by the wider scope of IS security expertise required for CISSP certification. Progent's ISSAP-certified security experts can help your company with all phases of architecture security such as.

  • Access Control Systems and Methodologies
  • Phone System and Network Infrastructure Protection
  • Cryptography Solutions
  • Requirements Evaluation and Security Guidelines
  • Business Continuity Planning (BCP) and DRP
  • Hardware Security
Find out more details concerning Progent's ISSAP Qualified Secure Network Architecture Consulting Professionals.

CISA Certified Network Security Auditing Engineering Support
The Certified Information Systems Auditor (CISA) credential is a recognized qualification that represents mastery in IS security audit and control. Certified by the American National Standards Institute (ANSI), the CISA credential requires that consultants undergo an extensive test given by the ISACA international professional group. Progent's CISA network security audit experts can assist your business with:

  • Information Systems Audit Process
  • IT Administration
  • Systems and Architecture Planned Useful Life
  • Information Technology Support
  • Protecting Data Resources
  • Business Continuity Planning
Learn the details about Progent's CISA Certified Security Auditing Engineering Services.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC certification program was initiated by ISACA in 2010 to validate an IT professional's skills to design, implement, and support IS control mechanisms to reduce network risk. Progent offers the expertise of a CRISC-certified engineer to help you to develop and carry out a business continuity strategy that follows leading practices promoted by CRISC and crafted to match your company's risk tolerance, business goals, and IT budget. Progent's CRISC-certified network risk mitigation specialists offer a variety of risk identification services such as:

  • Gather information and study documentation to help identify major risk scenarios
  • Inventory legal, regulatory, and business requirements and company standards associated with your information system to assess their possible influence on your strategic goals
  • Point out possible vulnerabilities for your business workflows to help in analyzing your corporate risk
  • Create a risk awareness program and provide training to ensure your organization appreciate information system risk so they can contribute to your risk control program
  • Connect identified risk vectors to related operational processes to help assign risk ownership
  • Validate risk appetite with executive leadership and key stakeholders to make sure they align
Get more information about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Certified Information System Security Consulting Services
Global Information Assurance Certification was established in 1999 to certify the skill of IT security professionals. GIAC's mission is to assure that a certified professional has the knowledge necessary to deliver support in critical areas of system, data, and application program security. GIAC accreditations are recognized by businesses and government organizations all over the world including and the United States National Security Agency. Progent's GIAC-certified IS security audit experts can assist your IT organization with:

  • Assessing Security Systems
  • Security Incident Response
  • Intrusion Detection
  • Web Services Security
  • SIEM solutions
Find out additional details concerning Progent's GIAC Information Assurance Services.

Get in Touch with a Progent Security Engineer
To see how to access a certified Progent security engineer for remote or on-premises support in New York, phone 1-800-993-9400 or visit Online Network Support.

© 2002- 2018 Progent Corporation. All rights reserved.