Small business networks in the state of New York can have fast and affordable remote technical support from Progent's accredited network security consultants to assist with urgent security issues. Rates are competitive, billing is per minute, engagement is quick, and support is unbeatable. Progent also offers help for long-term engagements that demand the expertise of senior security consultants with high-level industry credentials.

In case your New York small business is based some distance from more populated metropolitan areas including New York City, Buffalo, Rochester, Yonkers, or Syracuse, contact with local certified network security support specialists could be limited during an urgent situation. This could mean a drop in income for your business, angry customers, idle employees, and defocused executives. By calling Progent's remote support, you can get in touch with a certified security professional ready to provide expertise when you have to have it to get your information system operating and recover your information.

Progent can help you in your efforts to defend your IT environment with support services that can range from network security audits to developing a company-wide security plan. Progent offers economical service to help companies of any size to configure and maintain protected IT environments powered by Microsoft Windows and Cisco technology and that can include computers running UNIX, Linux, Solaris, or Apple Mac OS X platforms plus mobile clients with Apple iOS iPhones and iPads or Google Android or Windows Phone devices.

Progent can also assist you to outsource spam blocking and protection from email-borne security threats. Email Guard is Progent's email security solution that incorporates the technology of top data security vendors to deliver centralized control and comprehensive security for your email traffic. The hybrid structure of Progent's Email Guard combines a Cloud Protection Layer with a local security gateway appliance to provide complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based threats. The Cloud Protection Layer serves as a first line of defense and keeps the vast majority of unwanted email from making it to your network firewall. This decreases your exposure to inbound attacks and conserves system bandwidth and storage space. ProSight Email Guard's onsite gateway appliance provides a deeper layer of analysis for incoming email. For outgoing email, the onsite gateway provides AV and anti-spam protection, DLP, and email encryption. The onsite gateway can also help Exchange Server to monitor and safeguard internal email traffic that originates and ends inside your security perimeter.

Progent's certified consultants are available online or in person to offer a variety of urgent or longer-term IT security services which include:

  • Run extensive security evaluations
  • Recuperate promptly after serious security breaches
  • Set up effective firewalls
  • Configure secure methods for offsite and mobile connectivity
  • Deploy advanced utilities for protection against viruses, spam and DHAs
  • Develop a comprehensive security plan with proactive monitoring
  • Provide comprehensive Call Center Support
  • Develop an effective data backup and recovery strategy based on Data Protection Manager (DPM) backup/restore technology
If your company has an immediate requirement for IT security support, refer to Progent's Emergency Remote Technical Support.

Progent's engineers can deliver world-class services in vital fields of system protection that include security evaluation, firewall and VPN expertise, and advanced security planning.

System Evaluation
Progent's expert security consultants can evaluate the strength of your current computer security systems through exhaustive remote automated testing via sophisticated software tools and tested techniques. Progent's skill in administering this testing saves you money and offers a detailed picture of gaps. The knowledge your IT organization is provided can be used as the foundation of a security plan that will permit your network to run dependably and respond rapidly to new threats.

Automated Network Vulnerability Assessment
Progent offers expertise in the application of security auditing packages including Microsoft's MBSA and GFI LANguard NSS for affordably performing a set of programmed network auditing checks to uncover possible security vulnerabilities. Progent has broad knowledge of additional network analysis utilities including NMAP, AMAP application mapper, eEye, plus tools such as Metasploit, Netcat, Hydra, and Nikto. Progent can show you how to understand testing reports and react appropriately.

Progent can show you how to design protection into your business operations, configure scanning tools, plan and implement a protected system architecture, and suggest policies to maximize the safety of your network. Progent's security professionals are able to assist you to configure a firewall, implement safe remote access to email and data, and install VPN. Learn additional information about Progent's network security assessment.

Security Inventory Bundles for Small Businesses
Progent offers two ultra-affordable security inventory and evaluation bundles intended to allow small businesses to receive a professional network security evaluation from a qualified security expert. With Progent's External Security Inventory Scan, a security expert runs a comprehensive examination of your IT infrastructure from outside your firewalled perimeter to uncover possible weaknesses in the security posture you present to the outside world. With Progent's Internal Network Security Inventory Checkup, a certified security professional executes a network scan from a secure computer inside your company firewall to determine your exposure to internal assaults. Both security inventory services are set up and executed from a protected external site. The project is directed by an engineer with top security accreditations and who produces a report that summarizes and analyzes the data captured by the scan and suggests cost-effective improvements if appropriate.

Network Penetration Analysis Support Services
Stealth penetration testing is an important component of any comprehensive IT system security plan. Progent’s security professionals can perform thorough intrusion checks without the knowledge of your organization's in-house network support staff. Unannounced penetration testing shows whether existing security defense systems such as intrusion detection warnings and event history analysis are properly configured and actively checked. Find out more on Progent's network penetration analysis consulting.

Firewall/VPN Solutions
Progent's background in security solutions encompasses in-depth familiarity with major firewalls and Virtual Private Network products from a variety of vendors such as Cisco, Microsoft, and CheckPoint. Progent offers the services of consultants who have earned key industry accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Integration and Troubleshooting
The current ASA 5500-X Family of firewalls with Firepower Services deliver significantly more value than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 firewalls for all new installations. Since Cisco's acquisition of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort technology, which is the world's most deployed intrusion protection system. Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist your company to maintain your current PIX or ASA 5500 firewalls or upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your organization to plan, configure, optimize, manage and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Read more details about Cisco ASA Firewalls with Firepower Services configuration and troubleshooting support.

Cisco Security and Virtual Private Network Support Services
Cisco's network security and remote connection technology provide a full range of easy-to-administer security solutions to help protect your local and remote network infrastructure. Cisco's VPN product family includes switches, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's expert staff of consultants includes field-proven engineers with Cisco Certified Internetwork Expert and Cisco Certified Network Professional qualifications who are able to assist your company to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that align most closely with your company objectives. Find out additional information about Progent's Consulting Expertise for Cisco Security and Virtual Private Network Products.

Support Expertise for Additional Firewall and VPN Products
Progent offers small and mid-size businesses expert consulting for Intrusion Protection Systems and IPsec VPN products from leading firewall and VPN security companies such as Check Point Software, Juniper, and SonicWALL. Progent can help you create a comprehensive security strategy and select the right products from a variety of suppliers to support your security goals while staying within your spending restraints.

Progent's Flat-rate Managed Services for Information Assurance
Progent's affordable ProSight series of managed services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes cutting edge behavior-based analysis tools to defend endpoints as well as physical and virtual servers against modern malware attacks like ransomware and file-less exploits, which routinely evade legacy signature-matching AV products. ProSight ASM safeguards on-premises and cloud-based resources and offers a unified platform to address the complete malware attack progression including protection, infiltration detection, containment, remediation, and forensics. Top features include single-click rollback with Windows Volume Shadow Copy Service and automatic system-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection (ESP) managed services offer affordable in-depth protection for physical servers and VMs, desktops, mobile devices, and Microsoft Exchange. ProSight ESP uses adaptive security and advanced heuristics for continuously monitoring and reacting to cyber assaults from all vectors. ProSight ESP offers firewall protection, penetration alerts, endpoint control, and web filtering via leading-edge technologies packaged within one agent managed from a unified console. Progent's security and virtualization experts can assist your business to design and implement a ProSight ESP deployment that addresses your company's unique requirements and that helps you prove compliance with government and industry data protection standards. Progent will assist you specify and implement policies that ProSight ESP will manage, and Progent will monitor your network and react to alerts that require urgent attention. Progent can also help you to set up and test a backup and restore system such as ProSight Data Protection Services so you can recover quickly from a destructive security attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified endpoint security and Exchange email filtering.

ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services offer small and medium-sized businesses an affordable and fully managed solution for reliable backup/disaster recovery (BDR). Available at a fixed monthly rate, ProSight Data Protection Services automates and monitors your backup processes and enables rapid recovery of critical data, applications and VMs that have become lost or corrupted as a result of component failures, software bugs, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, apps, system images, plus Hyper-V and VMware images. Critical data can be backed up on the cloud, to a local storage device, or to both. Progent's BDR specialists can provide world-class expertise to set up ProSight Data Protection Services to to comply with government and industry regulatory standards like HIPPA, FINRA, PCI and Safe Harbor and, when necessary, can assist you to recover your business-critical data. Find out more about ProSight DPS Managed Cloud Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that incorporates the technology of leading data security companies to deliver centralized management and comprehensive security for your email traffic. The hybrid structure of Progent's Email Guard integrates cloud-based filtering with an on-premises security gateway device to offer advanced defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-based threats. Email Guard's cloud filter serves as a first line of defense and blocks the vast majority of unwanted email from reaching your network firewall. This decreases your exposure to external threats and saves system bandwidth and storage. Email Guard's on-premises security gateway device provides a further layer of inspection for incoming email. For outgoing email, the onsite security gateway offers anti-virus and anti-spam protection, protection against data leaks, and email encryption. The local security gateway can also help Microsoft Exchange Server to monitor and safeguard internal email that originates and ends within your security perimeter. For more details, see Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its key servers and apps hosted in a protected Tier III data center on a fast virtual host configured and managed by Progent's network support experts. With Progent's ProSight Virtual Hosting service model, the client owns the data, the operating system software, and the applications. Since the environment is virtualized, it can be moved easily to a different hardware solution without a lengthy and technically risky reinstallation procedure. With ProSight Virtual Hosting, you are not tied one hosting service. Learn more about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, find and protect data about your IT infrastructure, processes, applications, and services. You can instantly locate passwords or serial numbers and be alerted automatically about upcoming expirations of SSLs or domains. By cleaning up and managing your network documentation, you can save as much as 50% of time thrown away searching for vital information about your IT network. ProSight IT Asset Management includes a common repository for holding and collaborating on all documents related to managing your business network like standard operating procedures and How-To's. ProSight IT Asset Management also supports advanced automation for gathering and relating IT data. Whether you’re making improvements, doing maintenance, or responding to a crisis, ProSight IT Asset Management delivers the knowledge you require as soon as you need it. Learn more about ProSight IT Asset Management service.

Expert Network Security Planning
Every business should develop a carefully considered security strategy that incorporates both pre-attack procedures and reaction plans. The pre-attack plan is a set of procedures intended to minimize security weaknesses. The post-attack plan helps your company's network security personnel to evaluate the damage resulting from a security penetration, fix the system, document the event, and get business functions restored as rapidly as possible.

Progent's certified IS security consultants can to assist your company to perform a comprehensive vulnerability assessment and create a computer security strategy to implement security processes and controls to minimize future assaults and dangers.

CISM Certified System Security Consulting Services
The CISM organization describes the core capabilities and international standards of skill that IT security professionals are expected to learn. CISM provides executive management the confidence that consultants who have earned their CISM certification have the experience and capability to deliver effective security administration and support services. Progent can provide the services of CISM certified security consultants to assist businesses with:

  • IS Security Governance
  • Vulnerability Management
  • Information Security Implementation Management
  • IS Security Management
  • Recovery Planning
Read additional details about Progent's CISM Certified Security Support Expertise.

CISSP Certified Security Engineering Expertise
The CISSP credential recognizes mastery of a worldwide standard for data security. ANSI (American National Standards Institute) has awarded certification recognition in the area of data security stipulated by ISO/IEC 17024. Progent can provide the services of security professionals who have earned CISSP accreditation. Progent can give you access to a CISSP-certified expert to help your company in a broad range of security fields such as:

  • Security Management Procedures
  • Security Infrastructure and Paradigms
  • Access Control Solutions and Methodology
  • Software Development Security
  • Operations Security
  • Physical Security
  • Cryptography Mechanisms
  • Telecommunications, LAN and Internet Security
  • Business Continuity Planning
Learn more information about Progent's CISSP Network Security Support Expertise.

CISSP-ISSAP Qualified Secure System Architecture Consulting Assistance
Progent's CISSP-ISSAP certified information system architecture professionals are consultants who have earned ISSAP Certification through rigorous examination and extensive experience with network security architecture. The ISSAP credential represents proven competence in the more challenging requirements of information system security architecture within the broader scope of information security expertise required for CISSP certification. Progent's ISSAP-certified security consultants can assist your business with all aspects of secure network architecture such as.

  • Access Control Mechanisms and Methodologies
  • Telecommunications and System Infrastructure Security
  • Encryption/Decryption Options
  • Needs Analysis and Security Criteria
  • BCP and Disaster Recovery Planning
  • Site Security
Find out more details about Progent's ISSAP Certified Secure IT Architecture Support Expertise.

CISA Qualified Security Auditing Consulting Expertise
The Certified Information Systems Auditor credential is an important qualification that signifies mastery in network security audit and control. Accredited by ANSI, the CISA credential has candidates pass an extensive examination administered by the ISACA professional group. Progent's CISA-qualified information security audit experts can help your IT organization with:

  • IS Audit Process
  • Information Technology Administration
  • Network Assets and Architecture Lifecycle
  • Information Technology Service Delivery
  • Safeguarding Information Resources
  • Business Continuity Planning
Get more details about Progent's CISA Accredited Information System Security Auditing Engineering Support.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC certification program was initiated by ISACA in 2010 to verify an IT professional's ability to plan, deploy, and support IS controls to mitigate network risk. Progent offers the services of a CRISC-certified engineer to help you to create and carry out a business continuity or disaster recovery strategy based on leading practices promoted by CRISC and geared to align with your organization's risk appetite, business goals, and budgetary guidelines. Progent's CRISC-qualified network risk mitigation specialists can provide a variety of risk assessment services including:

  • Gather information and study documentation to identify major risk scenarios
  • Identify legal, regulatory, and business requirements and organizational policies related to your information system to determine their potential impact on your strategic goals
  • Point out possible vulnerabilities for your business processes to assist in evaluating your enterprise risk
  • Create a risk awareness initiative and conduct training to make sure your organization understand IT risk so they can contribute to your risk control process
  • Connect key risk scenarios to your associated business processes to help determine risk ownership
  • Determine risk tolerance with your senior management and major stakeholders to make sure they align
Find out additional details about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Qualified IS Security Consulting Assistance
Global Information Assurance Certification was established in 1999 to validate the skill of information technology security professionals. GIAC's goal is to verify that an accredited security consultant possesses the knowledge necessary to deliver support in key areas of system, information, and software security. GIAC certifications are recognized by companies and government organizations all over the world including and the U.S. NSA. Progent's GIAC security audit specialists can help your IT organization with:

  • Assessing Networks
  • Security Incident Handling
  • Intrusion Detection
  • Web Application Security
  • SIEM solutions
Read additional information concerning Progent's GIAC Information Assurance Expertise.

Get in Touch with a Progent Security Expert
To see how to get in touch with a certified security engineer for online or onsite help in New York, phone 1-800-993-9400 or go to Online Computer Help.

© 2002- 2019 Progent Corporation. All rights reserved.