Small business networks in New York can have fast and economical remote help from Progent's accredited network security engineers to resolve the toughest security problems. The cost is competitive, billing is per minute, engagement is fast, and service is unbeatable. Progent also offers assistance for complex engagements that requires the services of senior security engineers with high-level industry certifications.

In case your New York company is situated outside of major urban areas such as New York City, Buffalo, Rochester, Yonkers, or Syracuse, help from local certified security professionals could be limited when there's a security disaster. This can cause a drop in productivity for your business, angry customers, idle workers, and defocused executives. By contacting Progent's online services, you can get in touch with a qualified security engineer who can offer expertise when you have to have it to get your information system running and recover your information.

Progent can assist you in your initiatives to guard your IT environment with support services that ranges from security audits to developing a company-wide security plan. Progent offers affordable service to help companies of any size to configure and manage safe networks powered by Microsoft Windows and Cisco products and that can include servers and desktops running UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus BYOD clients with Apple iOS handhelds or Android or Windows Phone devices.

Progent can also assist you to outsource spam filtering and defense against e-mail-based attacks. Email Guard is Progent's email filtering and encryption solution that incorporates the services and infrastructure of leading information security companies to deliver centralized management and comprehensive security for your inbound and outbound email. The hybrid architecture of Progent's Email Guard combines a Cloud Protection Layer with a local gateway device to provide complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne malware. Email Guard's Cloud Protection Layer serves as a first line of defense and blocks most unwanted email from reaching your security perimeter. This decreases your vulnerability to external attacks and saves network bandwidth and storage. Email Guard's onsite security gateway device provides a deeper level of inspection for incoming email. For outbound email, the onsite gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The local gateway can also help Exchange Server to track and safeguard internal email that originates and ends inside your corporate firewall.

Progent's certified consultants are accessible remotely or on premises to offer a variety of urgent or longer-term IT security services including:

If your network has an emergency need for IT security support, go to Progent's Urgent Online Technical Help.

Progent's consultants provide world-class support in key areas of system protection including security assessment, firewall/VPN support, and high-level security planning.

System Security Assessment
Progent's certified security engineers can evaluate the effectiveness of your current network protection systems by performing exhaustive remote automated testing via sophisticated utilities and tested techniques. Progent's experience in administering this testing saves your company money and offers an objective portrayal of gaps. The knowledge your business gains can make up the foundation of a security plan that can allow your information system to run safely and respond quickly to future threats.

Automated Security Assessment
Progent provides expertise in the use of security evaluation products such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard for economically performing a variety of automatic network auditing checks to identify possible security holes. Progent has extensive knowledge of additional network auditing products such as NMAP, AMAP Application Scanner, eEye, as well as tools such as Metasploit Framework, Netcat, Socat, and Nikto. Progent can show you how to make sense of testing reports and react effectively.

Progent can show you how to build security into your business operations, install auditing software, define and implement a secure network architecture, and recommend procedures to maximize the safety of your network. Progent's security consultants are able to assist you to configure a firewall, implement secure remote connectivity to email and business applications, and integrate VPN. Learn additional information on Progent's automated security analysis.

Security Inventory Bundles for Small Companies
Progent offers two ultra-affordable security inventory and evaluation bundles intended to allow small businesses to get an independent security assessment from a certified security expert. With Progent's External Network Security Inventory Scan, a security expert runs a comprehensive test of your IT infrastructure from outside your firewall to determine potential risks in the security profile you expose to the outside world. With Progent's Internal Network Security Inventory Checkup, a certified security professional runs a system scan from an authorized computer within your firewall to uncover vulnerabilities to inside attacks. The two security inventory packages are set up and run from a secured external location. The project is overseen by a consultant with top security credentials and who generates a document that details and interprets the information collected by the security scan and suggests practical improvements if called for.

Stealth Security Penetration Testing Consulting
Stealth penetration checking is a key component of any successful IT system security strategy. Progentís security experts can run extensive intrusion tests without the knowledge of your company's in-house network support resources. Unannounced penetration testing uncovers whether existing security monitoring tools such as intrusion incident warnings and event history monitoring are correctly configured and actively monitored. Learn additional information on Progent's network penetration testing support services.

Firewalls and VPN Expertise
Progent's expertise in security technology includes in-depth field work with major firewalls and Virtual Private Network (VPN) technology offered by a variety of vendors including Cisco, Microsoft, and Symantec. Progent can provide the services of consultants with important industry certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Integration and Troubleshooting
The current Cisco ASA 5500-X Series of firewalls with Firepower Services provide substantially more performance than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new installations. After Cisco's acquisition of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort technology, which is the market's most popular network intrusion protection system. Firepower services bring enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can assist your company to maintain your legacy PIX or ASA 5500 firewalls and migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your company to design, integrate, optimize, administer and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Read more information about Cisco ASA 5500-X Firewalls with Firepower integration and debugging services.

Cisco Network Security and VPN Consulting Services
Cisco's network security and offsite access products provide a complete range of easy-to-administer security products to help safeguard your wired and wireless network infrastructure. Cisco's Virtual Private Network product family features routers, firewalls, intrusion detection devices and VPN concentrators. Progent's expert consulting staff includes experienced specialists with Cisco CCIE and Cisco Certified Network Professional qualifications who can assist your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that fit most closely with your business objectives. Read additional information concerning Progent's Support Expertise for Cisco Security Solutions and VPN Products.

Support Expertise for Other Firewall and VPN Solutions
Progent offers small and mid-size companies professional consulting for Intrusion Protection Systems and IPsec VPN products from leading firewall and VPN security companies such as WatchGuard, Juniper Networks, and Symantec. Progent can help you design a comprehensive security strategy and choose the right products from multiple vendors to achieve your security goals while staying within your budget limits.

Expert Network Security Planning
Every business should have a carefully considered security strategy that incorporates both pre-attack procedures and reaction planning. The pre-attack plan is a set of procedures designed to minimize vulnerabilities. The post-attack plan helps your security engineers to evaluate the impact caused by an attack, repair the damage, document the event, and get business functions restored as soon as possible.

Progent's expert IS security engineers are available to help you to run a comprehensive vulnerability assessment and create a network security strategy to establish security processes and controls to minimize ongoing attacks and threats.

CISM Qualified System Security Support Assistance
The CISM committee defines the basic competencies and worldwide standards of performance that IT security managers are expected to master. CISM gives executive management the assurance that consultants who have earned their CISM certification have the experience and capability to provide efficient security administration and consulting consulting. Progent offers the services of CISM qualified security professionals to assist companies with:

  • Network Security Strategies
  • Risk Analysis
  • Network Security Program Management
  • Information Security Administration
  • Response Planning
Find out more information concerning Progent's CISM Security Consulting Services.

CISSP Certified Security Consulting Services
The CISSP credential denotes expertise with a global standard for information security. The American National Standards Institute has awarded certification accreditation in the field of data security under ISO/IEC 17024. Progent offers the services of security professionals who have qualified for CISSP certification. Progent can give you access to a CISSP-certified professional to help your organization in a broad range of security fields such as:

  • Security Management Procedures
  • Security Architecture and Paradigms
  • Access Control Systems and Methodology
  • Software Development Security
  • Operations Security
  • Site Security
  • Data Encryption Technology
  • Telecommunications, LAN and Internet Security
  • Disaster Recovery Preparedness
Learn additional details about Progent's CISSP-certified Security Consulting Professionals.

ISSAP Certified Secure IT Architecture Consulting Expertise
Progent's ISSAP certified network architecture engineers are consultants who have been awarded ISSAP Certification as a result of thorough examination and significant experience with network security design. The ISSAP certification indicates proven competence in the most in-depth requirements of IS security architecture bounded by the wider scope of information security knowledge required for CISSP accreditation. Progent's ISSAP-certified security experts can help your business with all aspects of secure network architecture including.

  • Access Management Mechanisms and Methodologies
  • Telecommunications and Network Protection
  • Encryption/Decryption Solutions
  • Requirements Evaluation and Security Criteria
  • BCP and DRP
  • Physical Security
Read additional details concerning Progent's ISSAP Qualified Secure Network Architecture Support Expertise.

CISA Certified Network Security Auditing Consulting Services
The Certified Information Systems Auditor (CISA) credential is a recognized qualification that represents expertise in network security auditing. Certified by the American National Standards Institute (ANSI), the CISA credential has consultants pass an extensive test administered by the ISACA international professional group. Progent's CISA-qualified IS security audit experts are available to assist your IT organization in the areas of:

  • IS Audit Services
  • Information Technology Enforcement
  • Systems and Architecture Lifecycle
  • IT Support
  • Protecting Data Assets
  • Business Continuity Planning
Find out the details about Progent's CISA Qualified IS Security Auditing Consulting Expertise.

CRISC Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA in 2010 to validate an IT professional's skills to design, implement, and maintain IS controls to reduce risk. Progent offers the services of a CRISC-certified consultant to help your company to create and execute a workplace continuity or disaster recovery strategy that follows leading practices promoted by CRISC and geared to match your company's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC-certified network risk mitigation experts offer a variety of risk evaluation services including:

  • Collect data and review documentation to help identify major vulnerabilities
  • Identify legal, regulatory, and business mandates and organizational policies associated with your network to assess their potential impact on your strategic goals
  • Point out possible threats for your business workflows to assist in evaluating your enterprise risk
  • Develop a risk awareness program and provide training to ensure your organization understand IS risk so they can assist with your risk management process
  • Connect key risk vectors to related operational procedures to help assign risk responsibility
  • Determine risk tolerance with executive management and major stakeholders to make sure they match
Read additional details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Qualified Network Security Engineering Support
GIAC was established in 1999 to validate the knowledge of IT security engineers. GIAC's goal is to ensure that an accredited security consultant possesses the skills appropriate to provide services in key categories of network, information, and program security. GIAC accreditations are acknowledged by businesses and institutions all over the world including and the United States NSA. Progent's GIAC-certified security audit experts are available to help your IT organization with:

  • Auditing Perimeters
  • Incident Handling
  • Intrusion Detection
  • Web-based Services Security
  • SIEM solutions
Learn more information about Progent's GIAC Information Assurance Expertise.

Talk to a Certified Progent Security Expert
To find out how to get in touch with a certified Progent security consultant for remote or on-premises assistance in New York, phone 1-800-993-9400 or go to Online Computer Support.














© 2002- 2017 Progent Corporation. All rights reserved.