To get fast remote assistance with data security problems, businesses in Albany New York have access to world-class troubleshooting by contacting Progent's certified security engineers. Progent's remote service staff is ready to provide effective and affordable assistance with security emergencies that are impacting the viability of your IT network. Progent's security engineers are premier to provide help for environments powered by Microsoft Windows, Linux, Apple macOS and OS X, and popular versions of UNIX. Progent can provide advanced guidance for vital cybersecurity and recovery technologies such as AI-based EDR (End Point Protection and Response), MDR (Managed Detection and Response), full system restore validation, immutable backup, and off-site backup. Progent's broad range of services addresses firewall technology, email filtering and encryption, protected system architecture, and business continuity planning. Progent's support staff has earned the world's top security certifications including CISA and Information System Security Architecture Professional (ISSAP).
Progent offers online security assistance on a by-the-minute basis without minimum call duration and without extra fees for sign-up or off-hour service. By charging by the minute and by delivering top-level expertise, Progent's pricing policy keeps expenses under control and avoids situations where simple fixes turn into big expenses.
Ransomware Hot Line: 800-462-8800
Ransomware requires time to steal its way through a target network. Because of this, ransomware attacks are typically unleashed on weekends and at night, when support personnel are likely to take longer to recognize a break-in and are less able to mount a rapid and forceful response. The more lateral progress ransomware can make inside a victim's system, the longer it will require to recover core operations and scrambled files and the more information can be stolen and posted to the dark web. Progent's Ransomware Hot Line is intended to help organizations to take the urgent first phase in mitigating a ransomware attack by stopping the bleeding. Progent's online ransomware experts can assist you to identify and isolate infected devices and guard clean resources from being compromised. If your network has been breached by any version of ransomware, act fast. Get help quickly by calling Progent's Ransomware Hot Line at 800-462-8800.
We've Been Hacked: What Are We Supposed to Do Now?
If your network is now faced with a security crisis other than ransomware, visit Progent's Emergency Remote Technical Help to find out how to receive immediate assistance. Progent maintains a pool of certified network security experts who can provide online and on-premises support that includes threat containment, mitigation, recovery, forensics, and enhancement of your security posture to protect against future attacks.
For companies who have planned beforehand for a security breach, the formal incident response model outlined by GIAC is Progent's approved method of reacting to a serious security attack.
Introduction to Security Expertise
Coordinating network protection and preparedness for restoring critical data and functions after a security breach demands a continual program involving a variety of technologies and procedures. Progent's security consultants can help your business at whatever level in your attempt to secure your IT network, from security audits to creating a complete security program. Key areas supported by Progent's security engineers include Security Planning and Prevention, Data Recovery and Security Forensics, and Outsourced Filtering of E-mail-Based Spam and Viruses.
Designing and Implementing Secure Environments
Any organization ought to have a thoroughly thought out security strategy that includes both preventive and reactive activity. The proactive plan is a collection of precautions that helps to reduce vulnerabilities. The post-attack strategy defines activities to help security staff to evaluate the losses resulting from an attack, repair the damage, document the event, and revive business functions as quickly as feasible. Progent can advise you how to design security into your company operations. Progent can set up scanning software, create and execute a secure IT architecture, and recommend processes and policies that will maximize the protection of your network. Progent's security professionals are ready to help you to configure a firewall, deploy secure offsite connectivity to e-mail and data, and configure an effective VPN.
If your company is interested in an affordable option for jobbing out your network security administration, Progent's Round-the-clock Monitoring Services feature continual remote system tracking and quick resolution of emergencies.
Hybrid Cloud Solutions
Progent can help your IT team you to design, implement, manage and repair enterprise hybrid cloud solutions that combine physical and cloud resources and that are compliant with government and industry data security requirements. (Find out about Progent's Microsoft 365 Exchange Online integration with on-premises installations of Exchange, Azure enterprise hybrid cloud integration, Amazon Web Services (AWS) enterprise hybrid cloud solutions, and Google Cloud Platform (GCP) planning and integration expertise.)
Data Restoration and Failure Analysis
Progent has skill in restoring networks and servers that have been hacked, are quarantined, or have stopped working as a result of a security breakdown. Progent can help assess the losses resulting from the breach, restore normal functions, and recover data lost as a result of the attack. Progent's security specialists can also manage a comprehensive failure analysis by going over event logs and utilizing a variety of advanced assessment tools. Progent's background with security consulting reduces your business disruption and permits Progent to recommend effective ways to prevent or contain new attacks.
Ransomware Removal and Recovery Consulting
Progent offers the services of seasoned ransomware recovery experts with the knowledge to rebuild an environment damaged by a ransomware cryptoworm like Ryuk, Dharma, NotPetya, or Locky. To find out more, see ransomware cleanup and restoration expertise.
Work-from-Home (WFH) Cybersecurity Consulting
Work-from-Home workers commonly use their own computing devices and usually work in a poorly secured physical space. This situation increases their vulnerability to malware threats and requires judicious configuration of firewalls, AV tools, MFA-based identity verification, remote endpoint monitoring, extensive end-user training, and the creation of policies based on leading practices. Progent's seasoned group of at-home workforce solutions experts can assist you to plan, deploy and manage an effective cybersecurity solution that protects vital IT assets in environments that include an at-home workforce as well as hybrid workers.
Software/Firmware Update Management Services
Progent's support services for patch management offer businesses of all sizes a flexible and affordable alternative for assessing, validating, scheduling, implementing, and documenting software and firmware updates to your dynamic information network. Besides maximizing the protection and functionality of your IT environment, Progent's patch management services allow your in-house IT staff to concentrate on more strategic initiatives and tasks that deliver maximum business value from your network. Read more about Progent's patch management support services.
Extended Detection and Response (XDR) Based on SentinelOne
SentinelOne's Singularity product line is a subscription-based, cloud-centered cyberthreat management stack that includes AI algorithms and professional services to provide comprehensive endpoint detection and response (Singularity EDR) and extended detection and response (Singularity XDR). SentinelOne's low-profile software agents can be installed in minutes to defend endpoints against modern threats such as ransomware, familiar and new malware, trojan viruses, hacking tool sets, RAM exploits, script misuse, destructive macros, and living-off-the-land abuse. Progent is a certified SentinelOne Partner and dealer and manages thousands of endpoints secured by SentinelOne Singularity technology. SentinelOne Singularity is always the first EDR response software deployed by Progent to provide control and visibility of a customer's network at the outset of a ransomware recovery. For more details, see Progent's SentinelOne-based Extended Detection and Response services.
Consulting Services for Horizon3.ai's NodeZero Penetration Testing Products
NodeZero from Horizon3.ai is a leading-edge penetration test (pentest) product family that can deliver repeated, concurrent, programmable testing of your internal and perimeter network so you can uncover, rank, fix, and verify cybersecurity vulnerabilities before threat actors can take advantage of them. NodeZero pentests can strategically insert so-called tripwires like fake files or credentials to find out when your network is actively being targeted along key attack vectors. Tripwires provide enough detail to allow you to react quickly with your SIEM tools and procedures before an attacker can compromise your environment. Progent can provide the expertise of a NodeZero Certified Operator who can help you to use NodeZero to carry out comprehensive penetration tests of your network perimeter and your internal IT infrastructure in order to evaluate your current security profile. Progent can also assist you to strengthen your network security and can assist you to plan and deploy a unified cybersecurity ecosystem that simplifies management and provides optimum protection for on-premises, cloud-based, and perimeter IT assets. To learn additional details about Progent's threat analysis services based on on NodeZero's pentest platform, see Consulting Support for NodeZero's Penetration Test Products.
Stealth Penetration (PEN) Security Assessment Services
Stealth intrusion testing is an important component of any overall IT system security strategy. Progent's security professionals can run extensive penetration tests without the knowledge of your company's internal IT staff. Stealth penetration testing shows whether existing security defense tools such as intrusion incident warnings and event history analysis are correctly configured and consistently observed. Progent can implement ongoing automatic penetration testing to map your internal and external attack surface and to identify ways that exploitable vulnerabilities, improper configurations, compromised credentials, overlooked patches, and ill-advised IT product defaults can be chained together by threat actors into the multi-vector attacks typical of the latest variants of ransomware. Get additional information about Progent's Stealth PEN Assessment Experts.
Progent's Low-Cost Managed Services for Information Security
Progent's low-cost ProSight series of network management outsourcing services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance. Managed services offered by Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection solution that utilizes SentinelOne's cutting edge behavior analysis technology to guard endpoint devices as well as servers and VMs against modern malware assaults like ransomware and file-less exploits, which routinely evade traditional signature-based anti-virus tools. ProSight ASM protects local and cloud-based resources and offers a single platform to manage the complete malware attack progression including blocking, identification, containment, remediation, and forensics. Key features include single-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against newly discovered threats. Progent is a SentinelOne Partner. Find out more about Progent's
ProSight Enhanced Security Protection: Unified Endpoint Protection
ProSight Enhanced Security Protection (ESP) managed services deliver affordable in-depth security for physical servers and VMs, desktops, mobile devices, and Microsoft Exchange. ProSight ESP utilizes adaptive security and advanced heuristics for continuously monitoring and reacting to security threats from all vectors. ProSight ESP provides two-way firewall protection, intrusion alarms, device control, and web filtering through leading-edge technologies packaged within one agent managed from a unified console. Progent's security and virtualization experts can assist your business to design and configure a ProSight ESP environment that meets your company's unique needs and that helps you prove compliance with legal and industry data security standards. Progent will help you specify and configure security policies that ProSight ESP will manage, and Progent will monitor your network and respond to alerts that call for urgent attention. Progent can also help you to set up and test a backup and disaster recovery system such as ProSight Data Protection Services (DPS) so you can recover quickly from a potentially disastrous cyber attack like ransomware. Learn more about Progent's
ProSight Data Protection Services: Managed Cloud Backup
Progent has worked with advanced backup product companies to create ProSight Data Protection Services, a selection of subscription-based offerings that deliver backup-as-a-service (BaaS). All ProSight DPS services manage and monitor your data backup operations and enable transparent backup and fast restoration of important files/folders, applications, system images, and Hyper-V and VMware virtual machines. ProSight DPS helps your business avoid data loss resulting from equipment failures, natural calamities, fire, cyber attacks like ransomware, user error, ill-intentioned insiders, or software glitches. Managed services in the ProSight DPS product line include ProSight Altaro VM Backup with immutable cloud storage, ProSight 365 Backup (formerly Altaro Office 365 Backup), ProSight ECHO Backup based on Barracuda purpose-built storage, and ProSight DPS MSP360 Hybrid Backup. Your Progent service representative can help you to identify which of these fully managed services are most appropriate for your IT environment.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the technology of top data security companies to provide web-based control and world-class protection for your inbound and outbound email. The hybrid structure of Email Guard integrates a Cloud Protection Layer with a local gateway device to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne threats. The Cloud Protection Layer serves as a preliminary barricade and keeps most unwanted email from reaching your security perimeter. This reduces your vulnerability to external threats and conserves network bandwidth and storage. Email Guard's on-premises gateway appliance provides a deeper level of analysis for inbound email. For outgoing email, the local security gateway offers anti-virus and anti-spam filtering, DLP, and email encryption. The local gateway can also help Exchange Server to track and safeguard internal email that originates and ends within your security perimeter. For more information, see ProSight Email Guard spam and content filtering.
ProSight Duo MFA: Two-factor Authentication (2FA) Solutions
Progent's Duo MFA services utilize Cisco's Duo technology to defend against password theft by using two-factor authentication (2FA). Duo supports single-tap identity verification with Apple iOS, Android, and other personal devices. With Duo 2FA, when you sign into a secured application and enter your password you are requested to confirm who you are on a device that only you possess and that uses a different network channel. A wide range of devices can be used as this added means of ID validation such as a smartphone or wearable, a hardware token, a landline phone, etc. You can designate several verification devices. To find out more about Duo two-factor identity authentication services, go to Cisco Duo MFA two-factor authentication (2FA) services for at-home workers.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small organization can have its key servers and applications hosted in a protected Tier III data center on a fast virtual host configured and maintained by Progent's network support experts. Under Progent's ProSight Virtual Hosting model, the client owns the data, the operating system platforms, and the applications. Since the environment is virtualized, it can be moved immediately to a different hardware solution without requiring a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, your business is not tied a single hosting provider. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, retrieve and safeguard data about your network infrastructure, processes, business apps, and services. You can instantly locate passwords or IP addresses and be alerted automatically about impending expirations of SSLs or domains and warranties. By cleaning up and managing your network documentation, you can save as much as 50% of time thrown away searching for critical information about your network. ProSight IT Asset Management features a centralized repository for holding and sharing all documents related to managing your network infrastructure such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and associating IT information. Whether you're making enhancements, doing regular maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the knowledge you need as soon as you need it. Learn more about ProSight IT Asset Management service.
Specialized Security Services Offered by Progent
Progent's seasoned engineers offer world-class specialized help in key areas of computer protection including:
Security Vulnerability Audits and Compliance Assessment
Progent offers experience with information risk auditing utilities such as Microsoft Baseline Security Analyzer or LANguard for conducting a set of automatic network tests to reveal possible security gaps. Progent has broad skills with these and similar utilities and can help your company to analyze assessment results and respond efficiently. Progent's certified security engineers also provide web software validation and can conduct expert assessments of enterprise-wide security to determine your organization's compliance with major industry security specifications such as HIPAA, PCI, and ISO 17799. Also, Progent can evaluate the strength of your wireless protection including stationary wireless equipment as well as portable devices. Learn more information concerning Progent's Vulnerability Evaluation and Security Compliance Testing.
Cisco Security, PIX Firewall and ASA Firewall, Virtual Private Network (VPN), Aironet and Meraki Wireless Consulting
Progent's Cisco CCIE engineers and Cisco Certified Network Professionals (CCNPs) can provide world-class consulting services for Cisco's entire family of protection and Virtual Private Network products including PIX 500 Firewalls and ASA 5500 Firewalls, the Catalyst Firewall Services Module (FWSM), secure high-speed and integrated services routers, Aironet wireless access points and bridges, Cisco Meraki cloud-managed APs, and Catalyst switches. Read more information about Cisco Security, Virtual Private Network and Wireless Expertise.
Additional Firewall and VPN Technologies
As well as being expert in a broad range of network security solutions available from Microsoft and Cisco, Progent offers companies of all sizes expert consulting for technologies from other popular firewall and VPN suppliers. Progent's consultants offer:
Certified Information Security Manager (CISM) defines the basic competencies and worldwide benchmarks of service that IT security managers are expected to achieve. It offers executive management the confidence that those who have been awarded their CISM have the experience and knowledge to offer efficient security administration and consulting support. Progent can offer a CISM-certified expert to assist your enterprise in critical security disciplines including information security governance, risk management, information protection process management, and incident response management.
Find out additional details concerning Progent's Certified Information Security Manager (CISM) Security Support Expertise.
CISSP Security Support Expertise
Progent's Certified Information Systems Security Professionals (CISSPs) are cybersecurity engineers who have earned CISSP status as a result of demonstrated professional work, rigorous study, and formal testing. CISSP qualification indicates mastery of an international standard for IT security. American National Standards Institute has given the CISSP status accreditation in the area of IT security under ISO/IEC 17024. Areas of knowledge covered under CISSP include security administration procedures, security design and models, access permission methodology, applications development security, operations security, hardware security, cryptography, telecommunications, Internet security, and disaster recovery planning.
Find out additional information concerning Progent's CISSP Support Services.
CISSP-ISSAP Certified Experts for Secure System Infrastructure
Progent's ISSAP Certified security experts are specialists who have been awarded ISSAP accreditation following rigorous examination and substantial experience. field experience with network security architecture. ISSAP security experts have comprehensive understanding of access management mechanisms and methodologies, phone system and network infrastructure security, cryptography, requirements analysis, business continuity and disaster recovery, and physical security. Progent's ISSAP-premier security experts can help your business with all aspects of architecture security.
Find out more details concerning Progent's ISSAP Accredited Secure Network Infrastructure Consulting Services.
CISSP-ISSEP Premier Security Engineering Consultants
Cybersecurity consultants with CISSP-ISSEP (Information Systems Security Engineering Professional) certification have proven their ability to provide large organizations with the expertise expected of a senior systems engineer, information assurance systems engineer, information assurance officer, information assurance analyst, or senior security analyst. Progent can provide the skills of a certified CISSP-ISSEP cybersecurity expert to assist your enterprise to follow current system security engineering theory and processes in system development, evaluate system security designs according to cybersecurity engineering best practices, produce viable system designs that include compliant security features for all key system functions, develop effective design strategies to provide operational security, perform comprehensive risk analysis, and propose realistic security solutions that balance your operational requirements with your organization's tolerance for risk.
Find out the details about Progent's CISSP-ISSEP Cybersecurity Engineering Consulting Services.
CISA Security Auditor Professional Services
The Certified Information Systems Auditor (CISA) credential is a globally recognized achievement that signifies mastery in network security auditing. Certified by the American National Standards Institute, the CISA credential has consultants pass a comprehensive test administered by the ISACA international professional association. Progent can provide the services of a CISA-Certified security audit engineer trained to assist companies in the fields of information systems audit process, IT governance, network assets and infrastructure lifecycle, information technology support, protecting information resources, and disaster recovery planning.
Find out more details about Progent's Certified Information Systems Auditor Consulting Expertise.
CRISC Network Risk Mitigation Consultants
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA in 2010 to validate an IT professional's skills to plan, implement, and support IS control mechanisms to mitigate network risk. Progent can provide the services of a CRISC-certified engineer to help your company to create and carry out a business continuity strategy based on industry best practices identified by CRISC and geared to match your company's risk appetite, business objectives, and IT budget. Progent's risk mitigation expertise is a good fit the services provided by Progent's CISA-Premier consultants for objectively evaluating your IS control design and with the services of Progent's CISM experts for designing company-wide security policies.
Find out additional information concerning Progent's CRISC Risk Management Services.
GIAC (Global Information Assurance Certification) Support Expertise
Global Information Assurance Certification was founded in 1999 to certify the skill of computer security professionals. GIAC's mission is to make sure that a certified security consultant possesses the skills necessary to provide support in vital categories of network, information, and application program security. GIAC accreditations are acknowledged by companies and government organizations around the world including United States NSA. Progent can provide the help of GIAC certified consultants for all of the network security disciplines addressed within GIAC certification topics such as assessing networks, incident response, intrusion detection, web-based services security, and SIEM solutions.
Find out more details about Progent's GIAC Information Assurance Expertise.
Contact Progent for Network Security Help
If your company is situated in Albany New York and you want cybersecurity expertise, call Progent at
Upstate New York Contact Information:
Progent offers consulting services and onsite technical support throughout upstate New York.
| City | Address | Phone | Link |
| Albany | 90 State Street, Suite 700 Albany, NY 12207 United States |
(518) 641-1177 | Albany Network Support Services |
| Buffalo | 534 Delaware Ave Buffalo, NY 14202 United States |
(716) 442-2400 | Buffalo Network Support Services |
| Rochester | Mill Street Executive Center Rochester, NY 14614 United States |
(585) 471-2777 | Rochester Network Support Services |