Company computer networks in New York now have prompt and affordable remote technical support from Progent's accredited security professionals to help with urgent security issues. The cost is affordable, charges are per minute, engagement is quick, and support is world class. Progent also provides assistance for complex projects that demand the expertise of senior security consultants with top industry certifications.

In case your New York small business is located away from major metropolitan neighborhoods like New York City, Buffalo, Rochester, Yonkers, or Syracuse, contact with local certified network security professionals is often limited during an emergency. This could mean lost revenue for your company, upset clients, idle workers, and defocused management. By contacting Progent's remote support, you can get in touch with a certified security engineer who can deliver expertise whenever you have to have it to keep your network running and salvage your information.

Progent can assist you at any level in your initiatives to guard your IT environment with support ranging from security audits to developing a company-wide security plan. Progent provides affordable support to assist businesses of all sizes to configure and manage safe IT environments based on Microsoft Windows and Cisco products and that may include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X platforms plus BYOD users with Apple iPhones and iPads or Google Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam filtering and defense against email-borne attacks. Email Guard is Progent's email security platform that incorporates the technology of top data security vendors to deliver centralized management and comprehensive protection for all your email traffic. The hybrid structure of Email Guard integrates a Cloud Protection Layer with a local gateway device to provide complete protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based malware. ProSight Email Guard's cloud filter acts as a first line of defense and blocks the vast majority of threats from making it to your network firewall. This reduces your vulnerability to inbound threats and saves network bandwidth and storage. ProSight Email Guard's onsite security gateway appliance provides a further layer of inspection for inbound email. For outgoing email, the onsite gateway offers AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also help Exchange Server to track and safeguard internal email traffic that originates and ends within your security perimeter.

Progent's security engineers are available online or on premises to provide a range of urgent or longer-term computer security services such as:

  • Perform automated network security audits
  • Recover promptly after virus and worm attacks
  • Set up effective firewalls
  • Configure secure techniques for offsite and mobile connectivity
  • Deploy effective software for protection against viruses, spam and directory harvest attacks
  • Develop a comprehensive security strategy with 24x7 network monitoring
  • Provide outsourced Call Center Support
  • Create an effective backup and business continuity strategy based on Microsoft DPM backup capability
If your company has an immediate requirement for computer security support, go to Progent's Emergency Remote Network Support.

Progent's security experts offer world-class services in vital areas of system protection that include analysis, firewall and VPN solutions, and advanced security consulting.

System Audits
Progent's expert security consultants can evaluate the effectiveness of your current computer protection environment by performing exhaustive remote automated testing via advanced software tools and tested techniques. Progent's experience in administering this testing saves you time and money and offers an objective portrayal of gaps. The knowledge your company is provided can make up the foundation of a network protection strategy that can permit your network to run dependably and respond rapidly to new risks.

Automated Network Vulnerability Analysis
Progent provides expertise in the use of security auditing packages including Microsoft's MBSA and GFI LANguard Network Security Scanner for economically running a variety of programmed system auditing scans to uncover possible security holes. Progent has extensive experience with additional network analysis utilities such as NMAP, AMAP, eEye Vulnerability Scanner, plus utilities like SolarWinds, Hydra, and Nikto. Progent can help you to understand audit reports and react effectively.

Progent can show you how to build protection into your business processes, configure auditing software, plan and implement a protected system architecture, and recommend policies to maximize the safety of your IT system. Progent's security engineers are ready to assist you to set up a firewall, design secure remote connectivity to email and data, and integrate virtual private network. Find out more concerning Progent's automated security analysis.

Security Inventory Service Packages for Small Businesses
Progent offers two ultra-affordable security inventory scanning packages designed to enable small companies to get a professional security assessment from a certified security specialist. With Progent's External Security Inventory Scan, a security engineer administers a comprehensive test of your network from beyond your firewalled perimeter to uncover possible weaknesses in the security profile you present to the outside world. With Progent's Internal Security Inventory Checkup, a security engineer executes a network scan from a secure computer within your firewall to assess vulnerabilities to internal attacks. The two security inventory packages are set up and run from a protected remote site. The project is directed by an engineer with top security credentials and who generates a document that details and analyzes the information captured by the security scan and suggests practical remediation if called for.

Stealth Intrusion Analysis Consulting
Stealth penetration testing is a key part of any comprehensive network security strategy. Progentís security professionals can run extensive intrusion checks without the awareness of your organization's in-house IT staff. Unannounced penetration testing uncovers whether current security monitoring tools such as intrusion detection warnings and event log analysis are properly set up and consistently monitored. Learn additional information concerning Progent's network penetration testing consulting.

Firewall and Virtual Private Network Support
Progent's expertise in network security solutions encompasses in-depth field work with major firewalls and VPN products offered by multiple vendors including Cisco, Microsoft, and CheckPoint. Progent offers the services of engineers who have earned important industry accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Integration and Debugging
The new ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer significantly more bang for the buck than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new installations. Since Cisco's acquisition of Sourcefire, the entire line of Cisco ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the market's most deployed intrusion protection system. Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can help your company to manage your existing PIX or Cisco ASA 5500 security appliances or migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help you to design, deploy, tune, manage and troubleshoot firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. See more details about ASA 5500-X Firewalls with Firepower Services configuration and troubleshooting services.

Cisco Network Security and VPN Consulting Services
Cisco's security and remote connection technology offer a comprehensive line of manageable security solutions to help protect your wired and wireless network infrastructure. Cisco's VPN line features switches, firewalls, intrusion detection systems and VPN appliances. Progent's expert consulting staff includes field-proven specialists with Cisco Certified Internetwork Expert and CCNP certifications who can help your organization to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that align most closely with your company objectives. Learn additional details concerning Progent's Support Expertise for Cisco Security Technology and VPN Products.

Support Services for Additional Firewall and Virtual Private Network Products
Progent provides small and mid-size businesses professional consulting for Intrusion Protection Systems and IPsec VPN technology from major firewall and Virtual Private Network security companies such as WatchGuard, Juniper Networks, and SonicWALL. Progent can show you how to design a detailed security strategy and select appropriate products from a variety of suppliers to support your security objectives while staying within your spending limits.

Progent's Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight portfolio of network management outsourcing services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services available from Progent include:
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the technology of leading data security companies to deliver centralized management and world-class protection for your email traffic. The powerful architecture of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local security gateway device to provide complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based malware. The cloud filter serves as a first line of defense and keeps the vast majority of threats from making it to your security perimeter. This reduces your vulnerability to inbound attacks and conserves system bandwidth and storage space. Email Guard's onsite security gateway appliance adds a deeper layer of analysis for inbound email. For outgoing email, the onsite gateway provides anti-virus and anti-spam protection, protection against data leaks, and email encryption. The local security gateway can also assist Microsoft Exchange Server to track and safeguard internal email that stays inside your corporate firewall. For more details, visit Email Guard spam and content filtering.

ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection (EPP) solution that incorporates next generation behavior-based machine learning technology to defend endpoints as well as physical and virtual servers against new malware attacks such as ransomware and email phishing, which easily evade legacy signature-matching AV products. ProSight Active Security Monitoring protects on-premises and cloud-based resources and provides a unified platform to manage the complete malware attack progression including protection, identification, mitigation, cleanup, and forensics. Key features include one-click rollback with Windows Volume Shadow Copy Service and automatic system-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.

ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services provide small and mid-sized businesses an affordable and fully managed solution for reliable backup/disaster recovery (BDR). For a fixed monthly cost, ProSight DPS automates and monitors your backup activities and allows fast recovery of vital files, apps and VMs that have become lost or corrupted as a result of component breakdowns, software glitches, disasters, human error, or malicious attacks like ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, apps, system images, plus Hyper-V and VMware images. Critical data can be protected on the cloud, to a local storage device, or mirrored to both. Progent's backup and recovery specialists can deliver advanced expertise to set up ProSight Data Protection Services to to comply with regulatory standards such as HIPPA, FINRA, and PCI and, when necessary, can assist you to restore your critical data. Learn more about ProSight Data Protection Services Managed Cloud Backup.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, maintain, find and safeguard data about your network infrastructure, procedures, business apps, and services. You can instantly find passwords or serial numbers and be warned automatically about impending expirations of SSL certificates or warranties. By updating and managing your IT infrastructure documentation, you can save as much as 50% of time spent looking for critical information about your IT network. ProSight IT Asset Management features a common repository for holding and sharing all documents required for managing your network infrastructure such as recommended procedures and How-To's. ProSight IT Asset Management also offers advanced automation for collecting and relating IT data. Whether youíre making enhancements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the data you need when you need it. Find out more about ProSight IT Asset Management service.

Certified Network Security Consulting
Every company ought to develop a thoroughly considered security program that includes both pre-attack processes and response plans. The pre-attack plan is a collection of mechanisms designed to minimize vulnerabilities. The reactive strategy helps your IT security engineers to assess the impact resulting from an attack, repair the network, record the event, and get the IT network restored as rapidly as feasible.

Progent's expert IT security engineers are available to assist your business to run a comprehensive risk assessment and define a company-wide security plan to establish security processes and controls to minimize future attacks and dangers.

CISM Qualified System Security Engineering Services
The Certified Information Security Manager (CISM) organization defines the basic capabilities and worldwide standards of skill that IT security managers are required to learn. It provides executive management the confidence that those who have qualified for their CISM certification have the background and capability to deliver effective security administration and support consulting. Progent offers the support of CISM certified security consultants to assist companies with:

  • Information Security Strategies
  • Vulnerability Analysis
  • Network Security Program Management
  • IS Security Management
  • Recovery Planning
Learn more information about Progent's CISM IS Security Consulting Expertise.

CISSP Certified Security Consulting Services
CISSP denotes mastery of a worldwide standard for network security. The American National Standards Institute has awarded certification recognition in the area of data security stipulated by ISO 17024. Progent offers access to of security professionals who have earned CISSP certification. Progent can provide a CISSP-certified professional to help your organization in a variety security areas such as:

  • Security Management Practices
  • Security Infrastructure and Models
  • Access Control Systems and Processes
  • Applications Development Security
  • Secure Operations
  • Physical Security
  • Encryption/Decryption Technology
  • Telecommunications, Network and Internet Security
  • Disaster Recovery Planning
Learn additional information concerning Progent's CISSP Accredited IS Security Support Professionals.

ISSAP Certified Secure Network Architecture Engineering Services
Progent's ISSAP certified network architecture engineers are consultants who have been awarded ISSAP Certification through rigorous testing and significant experience with information security design. The ISSAP certification represents demonstrated skill in the most in-depth requirements of information security architecture within the broader scope of information system security knowledge required for CISSP accreditation. Progent's ISSAP-certified security consultants can assist your company with all aspects of secure network architecture such as.

  • Access Control Systems and Techniques
  • Telecommunications and Network Security
  • Data Encryption Solutions
  • Requirements Evaluation and Security Guidelines
  • BCP and DRP
  • Physical Security
Learn additional information about Progent's ISSAP Certified Secure Information System Architecture Engineering Professionals.

CISA Qualified IS Security Auditing Engineering Assistance
The CISA accreditation is a recognized achievement that represents expertise in network security auditing. Certified by the American National Standards Institute (ANSI), the CISA accreditation has consultants undergo a comprehensive examination administered by the ISACA international professional group. Progent's CISA-certified security audit consultants are available to assist your business with:

  • Information Systems Audit Services
  • Information Technology Administration
  • Systems and Infrastructure Lifecycle Planning
  • IT Support
  • Safeguarding Data Resources
  • Disaster Recovery Preparedness
Learn the details about Progent's CISA Accredited Security Auditing Engineering Services.

Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC program was established by ISACA to verify an IT professional's skills to design, implement, and maintain information system controls to reduce risk. Progent can provide the expertise of a CRISC-certified engineer to help your company to develop and execute a workplace continuity or disaster recovery strategy based on leading practices promoted by CRISC and crafted to align with your company's risk appetite, business objectives, and IT budget. Progent's CRISC IT risk mitigation experts can provide a range of risk evaluation services such as:

  • Collect data and study documentation to evaluate major risk scenarios
  • Identify statutory, industry, and contractual requirements and company standards associated with your information system to determine their possible impact on your strategic objectives
  • Identify potential threats for your business workflows to assist in analyzing your corporate risk
  • Create a risk awareness initiative and provide training to make sure your stakeholders understand information system risk so they can contribute to your risk management program
  • Match key risk scenarios to related operational processes to help assign risk responsibility
  • Determine risk tolerance with your senior leadership and key stakeholders to ensure they match
Find out the details about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Qualified IS Security Engineering Assistance
Global Information Assurance Certification was founded in 1999 to validate the skill of information technology security professionals. GIAC's mission is to assure that an accredited security consultant possesses the skills necessary to provide services in important categories of network, information, and software security. GIAC certifications are recognized by companies and government organizations throughout the world including and the U.S. NSA. Progent's GIAC-certified network security audit experts are available to assist your company with:

Read more information concerning Progent's GIAC Information Assurance Services.

Contact a Security Engineer
To learn how to access a certified Progent security engineer for remote or on-premises support in New York, call 1-800-993-9400 or visit Online Network Support.














© 2002- 2018 Progent Corporation. All rights reserved.