Small business networks in New York can now get fast and affordable online technical support from Progent's qualified security engineers to help with critical security issues. Rates are reasonable, charges are by the minute, engagement is quick, and service is world class. Progent also offers help for complex projects that requires the knowledge of senior security engineers with high-level industry credentials.

In case your New York business is away from major metropolitan neighborhoods such as New York City, Buffalo, Rochester, Yonkers, or Syracuse, the availability of local certified security professionals is often problematic during a crisis. This could mean lost income for your company, upset customers, idle workers, and distracted executives. By calling Progent, you can get in touch with a certified security consultant who can provide expertise whenever you require it to keep your computer network operating and restore your data.

Progent can assist you in a variety of ways in your initiatives to protect your network with services that can range from network security audits to creating a comprehensive security strategy. Progent provides affordable support to assist companies of any size to configure and maintain secure networks based on Windows and Cisco technology and that may include computers based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus mobile users with Apple iOS handhelds or Android or Windows Phone smart phones and tablets.

Progent can also show you how to outsource spam blocking and protection from e-mail-based security threats. Email Guard is Progent's email security platform that incorporates the technology of leading data security vendors to deliver web-based control and comprehensive protection for your inbound and outbound email. The hybrid structure of Email Guard managed service combines a Cloud Protection Layer with a local security gateway appliance to provide complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. ProSight Email Guard's Cloud Protection Layer serves as a first line of defense and keeps most threats from making it to your security perimeter. This decreases your vulnerability to external attacks and conserves network bandwidth and storage space. ProSight Email Guard's onsite security gateway device provides a deeper layer of inspection for incoming email. For outbound email, the local gateway offers anti-virus and anti-spam protection, protection against data leaks, and encryption. The onsite security gateway can also help Exchange Server to track and safeguard internal email that originates and ends within your corporate firewall.

Progent's security engineers are accessible online or on site to provide a range of emergency or project-based network security services including:

If your network has an urgent need for IT security help, go to Progent's Urgent Online Technical Help.

Progent's engineers can deliver world-class support in key facets of system security including security assessment, firewall and VPN solutions, and high-level security planning.

System Audits
Progent's expert security consultants can evaluate the effectiveness of your existing network protection systems by performing comprehensive remote automated testing based on advanced software tools and proven techniques. Progent's experience in administering this testing saves your company consulting fees and assures an objective portrayal of security holes. The information your business is provided can make up the foundation of a network protection strategy that will permit your network to run safely and react rapidly to new threats.

Automated Network Security Audits
Progent offers expertise in the use of security evaluation products including Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard NSS for economically running a set of automatic system testing checks to uncover possible security holes. Progent has extensive knowledge of additional network analysis utilities including NMAP Port Scanner, AMAP, eEye Vulnerability Scanner, plus tools like Metasploit, Netcat, Socat, and Nikto. Progent can show you how to make sense of testing reports and respond effectively.

Progent can show you how to build protection into your business processes, configure auditing software, define and implement a protected network environment, and recommend procedures to maximize the security of your IT system. Progent's security consultants are able to help you configure a firewall, design secure remote connectivity to email and business applications, and install VPN. Find out additional information about Progent's automated security audits.

Security Inventory Scanning Packages for Small Companies
Progent offers two ultra-affordable security inventory bundles designed to enable small companies to get an independent network security evaluation from a certified security expert. With Progent's External Security Inventory Scan, a security engineer administers an extensive test of your IT infrastructure from beyond your firewall to determine potential weaknesses in the security profile you present to the outside world. With Progent's Internal Network Security Inventory Scan, a certified security professional runs a network scan from a secure machine inside your company firewall to evaluate vulnerabilities to internal attacks. The two security inventory services are set up and executed from a protected external location. The project is directed by a consultant who has earned top security accreditations and who produces a document that details and interprets the information captured by the scan and suggests cost-effective remediation if called for.

Stealth Intrusion Analysis Support Services
Stealth intrusion checking is a key component of any serious IT system security strategy. Progentís security professionals can run extensive penetration checks without the knowledge of your organization's internal network support staff. Stealth penetration checking uncovers whether existing security defense systems such as intrusion detection warnings and event log monitoring are correctly set up and actively checked. Learn more concerning Progent's network penetration testing consulting.

Firewalls and VPN Solutions
Progent's background in network security technology encompasses in-depth familiarity with leading firewalls and VPN products offered by multiple companies including Cisco, Microsoft, and Symantec. Progent can provide the support of consultants with key industry certifications such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Debugging
The latest generation of ASA 5500-X Family of firewalls with Firepower Services provide significantly more value than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 firewalls for all new deployments. Following Cisco's acquisition of Sourcefire, the whole line of ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system. Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can help your company to manage your existing PIX or Cisco ASA 5500 firewalls and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your organization to design, integrate, optimize, manage and debug firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about ASA Firewalls with Firepower Services integration and debugging support.

Cisco Network Security and Virtual Private Network Support Services
Cisco's security and remote connection products represent a full line of easy-to-administer security products to help protect your local and remote network infrastructure. Cisco's Virtual Private Network product family features routers, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's professional consulting staff includes experienced engineers with Cisco's CCIE and CCNP certifications who are able to help your business to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that fit best with your company goals. Read additional details about Progent's Consulting Services for Cisco Security Solutions and Virtual Private Network Products.

Engineering Services for Additional Firewall and Virtual Private Network Products
Progent offers small and medium size businesses expert consulting for Intrusion Protection Systems and IPsec VPN technology from major firewall and VPN security vendors including WatchGuard, Juniper, and Symantec. Progent can show you how to design a comprehensive security plan and select appropriate technologies from multiple suppliers to achieve your security goals while sticking within your spending restraints.

Progent's Low-Cost Managed Services for Information Security
Progent's low-cost ProSight series of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that utilizes next generation behavior analysis tools to defend endpoints as well as physical and virtual servers against new malware attacks like ransomware and email phishing, which routinely escape traditional signature-matching AV tools. ProSight ASM safeguards local and cloud-based resources and provides a single platform to manage the entire malware attack progression including blocking, detection, mitigation, cleanup, and post-attack forensics. Key capabilities include single-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection managed services offer economical multi-layer protection for physical servers and virtual machines, workstations, mobile devices, and Exchange email. ProSight ESP utilizes contextual security and modern behavior analysis for round-the-clock monitoring and reacting to security threats from all attack vectors. ProSight ESP delivers firewall protection, intrusion alarms, device control, and web filtering via cutting-edge tools packaged within one agent accessible from a unified console. Progent's data protection and virtualization experts can assist your business to plan and configure a ProSight ESP deployment that meets your organization's specific requirements and that helps you achieve and demonstrate compliance with legal and industry information security standards. Progent will help you specify and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alarms that call for immediate attention. Progent can also assist your company to install and verify a backup and disaster recovery system such as ProSight Data Protection Services so you can recover rapidly from a potentially disastrous security attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Microsoft Exchange filtering.

ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services from Progent offer small and medium-sized businesses a low cost end-to-end service for secure backup/disaster recovery. For a fixed monthly price, ProSight Data Protection Services automates and monitors your backup activities and enables fast recovery of vital data, apps and VMs that have become unavailable or corrupted due to hardware failures, software glitches, disasters, human mistakes, or malware attacks such as ransomware. ProSight DPS can help you back up, recover and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware images. Critical data can be backed up on the cloud, to an on-promises device, or mirrored to both. Progent's backup and recovery specialists can deliver world-class support to configure ProSight DPS to to comply with regulatory requirements such as HIPPA, FINRA, and PCI and, when needed, can help you to recover your business-critical information. Learn more about ProSight DPS Managed Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the infrastructure of leading data security vendors to provide web-based control and world-class security for your email traffic. The powerful structure of Progent's Email Guard managed service integrates cloud-based filtering with a local gateway appliance to offer advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. Email Guard's Cloud Protection Layer acts as a first line of defense and blocks most threats from making it to your security perimeter. This decreases your vulnerability to external threats and saves system bandwidth and storage. Email Guard's on-premises gateway appliance adds a further layer of inspection for incoming email. For outgoing email, the onsite gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also help Microsoft Exchange Server to monitor and protect internal email traffic that stays inside your security perimeter. For more details, visit Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and applications hosted in a secure fault tolerant data center on a high-performance virtual host set up and maintained by Progent's IT support experts. With the ProSight Virtual Hosting service model, the customer owns the data, the operating system platforms, and the applications. Since the system is virtualized, it can be ported immediately to a different hosting solution without a lengthy and technically risky reinstallation procedure. With ProSight Virtual Hosting, you are not tied one hosting service. Learn more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, find and protect information related to your network infrastructure, processes, business apps, and services. You can instantly find passwords or serial numbers and be alerted automatically about upcoming expirations of SSL certificates ,domains or warranties. By updating and organizing your network documentation, you can save as much as 50% of time thrown away trying to find vital information about your network. ProSight IT Asset Management includes a common location for storing and sharing all documents required for managing your business network such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports advanced automation for collecting and relating IT information. Whether youíre making improvements, doing regular maintenance, or responding to an emergency, ProSight IT Asset Management delivers the data you need as soon as you need it. Learn more about Progent's ProSight IT Asset Management service.

Expert Security Design
Any business ought to have a thoroughly thought out security program that includes both pre-attack procedures and response plans. The proactive plan is a set of mechanisms that help to reduce security weaknesses. The reactive plan helps your company's network security engineers to assess the impact caused by an attack, repair the system, document the experience, and get the IT network operational as soon as possible.

Progent's expert IS security consultants are available to help your company to run a comprehensive risk assessment and define a company-wide security strategy to establish security policies and controls to mitigate ongoing assaults and dangers.

CISM Accredited Information Security Consulting Expertise
The CISM organization describes the core competencies and global standards of performance that IT security managers are expected to learn. It provides business management the confidence that those who have earned their CISM credential possess the background and capability to provide efficient security administration and consulting consulting. Progent offers the services of CISM qualified security professionals to assist businesses with:

  • Information Security Strategies
  • Risk Analysis
  • Network Security Program Management
  • IS Security Administration
  • Recovery Management
Learn more details concerning Progent's CISM Accredited IS Security Support Expertise.

CISSP Qualified Security Engineering Assistance
CISSP denotes expertise with an international standard for information security. ANSI (American National Standards Institute) has granted certification accreditation in the area of data protection under ISO/IEC 17024. Progent offers the services of security experts who have qualified for CISSP certification. Progent can give you access to a CISSP-certified consultant to help your business in a broad range of security fields including:

  • Security Administration Practices
  • Security Architecture and Models
  • Access Control Systems and Processes
  • Software Development Security
  • Secure Operations
  • Physical Security
  • Data Encryption Mechanisms
  • Telecom, LAN and WAN Security
  • Business Continuity Preparedness
Find out more information about Progent's CISSP Qualified Information Security Support Expertise.

ISSAP Qualified Secure System Architecture Consulting Services
Progent's ISSAP certified information system architecture engineers are experts who have been awarded ISSAP status through rigorous testing and extensive work with information security design. The Information System Security Architecture Professional (ISSAP) certification represents proven mastery in the most complex requirements of information system security architecture within the broader scope of information system security expertise required for CISSP accreditation. Progent's ISSAP-certified security consultants can assist your business with all phases of secure network architecture including.

  • Access Management Systems and Methodologies
  • Telecom and Network Infrastructure Security
  • Data Encryption Solutions
  • Needs Analysis and Security Criteria
  • BCP and Disaster Recovery Planning
  • Site Security
Find out more details about Progent's ISSAP Certified Secure System Architecture Support Professionals.

CISA Accredited Network Security Auditing Engineering Services
The Certified Information Systems Auditor (CISA) credential is a prestigious achievement that represents expertise in network security audit and control. Certified by ANSI, the CISA credential requires that consultants undergo an extensive test given by the ISACA professional group. Progent's CISA-certified network security audit consultants can assist your IT organization in the areas of:

  • IS Audit Process
  • Information Technology Enforcement
  • Network Assets and Architecture Planned Useful Life
  • IT Support
  • Protecting Information Resources
  • Disaster Recovery Preparedness
Get more information about Progent's CISA Accredited Information System Security Auditing Engineering Expertise.

Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA in 2010 to validate an IT professional's skills to plan, implement, and support IS control mechanisms to reduce network risk. Progent can provide the expertise of a CRISC-certified consultant to assist your company to develop and execute a business continuity plan based on leading practices identified by CRISC and geared to align with your company's risk appetite, business objectives, and IT budget. Progent's CRISC network risk management specialists can provide a variety of risk identification services including:

  • Collect information and study documentation to help identify significant risk scenarios
  • Inventory legal, industry, and business requirements and company policies related to your network to determine their possible impact on your business objectives
  • Point out possible threats for your business workflows to assist in evaluating your corporate risk
  • Create a risk awareness initiative and provide seminars to make sure your organization appreciate IS risk so they can contribute to your risk management program
  • Match identified risk scenarios to your associated business procedures to help assign risk ownership
  • Determine risk tolerance with your senior management and major stakeholders to ensure they align
Find out additional information concerning Progent's CRISC Experts.

GIAC Certified IS Security Consulting Support
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the knowledge of network security engineers. GIAC's goal is to assure that an accredited professional has the knowledge needed to deliver support in critical areas of network, data, and application security. GIAC accreditations are recognized by businesses and government organizations around the world including and the United States National Security Agency (NSA). Progent's GIAC-qualified IS security audit consultants are available to help your IT organization with:

Read more information about Progent's GIAC Information Assurance Support.

Talk to a Progent Security Engineer
To find out how you can access a Progent security engineer for online or on-premises help in New York, phone 1-800-993-9400 or visit Online Network Support.














© 2002- 2018 Progent Corporation. All rights reserved.