Company computer networks in the state ofConnecticutcan now get quick and affordable online access to Progent's qualified security professionals to assist with the toughest security issues. The cost is competitive, billing is per minute, engagement is fast, and service is world class. Progent also provides help for long-term engagements that demand the knowledge of senior security consultants with top industry certifications.
If yourConnecticutbusiness is based far from major urban neighborhoods such asBridgeport, New Haven, Hartford, or Stamford, help from nearby accredited network security engineers is often limited during an urgent situation. This can result in lost revenue for your company, upset customers, unproductive workers, and distracted executives. By contacting Progent, you have access to a Certified security professional who can provide expertise whenever you need it to get your network on line and salvage your data.
Progent can help you in all your efforts to protect your information system with support services ranging from network security audits to creating a comprehensive security plan. Progent provides economical support to assist companies of any size to design and manage protected networks powered by Windows and Cisco products and that may include servers and desktops running UNIX, Linux, Sun Solaris, or Mac OS X platforms as well as BYOD clients with Apple iPhones and iPads or Google Android or Windows Phone devices.
Progent can also assist you to outsource spam blocking and defense against e-mail-based security threats. Email Guard is Progent's email filtering and encryption solution that uses the technology of leading data security companies to deliver centralized control and comprehensive protection for your inbound and outbound email. The hybrid structure of Email Guard integrates cloud-based filtering with a local security gateway device to offer advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. ProSight Email Guard's Cloud Protection Layer acts as a preliminary barricade and keeps the vast majority of threats from reaching your security perimeter. This reduces your exposure to external attacks and saves system bandwidth and storage. ProSight Email Guard's on-premises security gateway device adds a deeper layer of analysis for incoming email. For outbound email, the onsite security gateway offers AV and anti-spam protection, DLP, and encryption. The on-premises gateway can also help Exchange Server to monitor and safeguard internal email that originates and ends within your security perimeter.
Progent's certified engineers are accessible online or in person to offer a variety of emergency or longer-term IT security services such as:
If your network has an emergency requirement for IT security help, refer to Progent's Emergency Online Network Help.
Progent's consultants can deliver world-class services in key fields of computer security that include security evaluation, firewalls and VPN, and high-level security planning.
Progent's certified security consultants can assess the strength of your existing computer protection implementation through exhaustive remote automated analysis based on advanced utilities and tested procedures. Progent's experience in this service saves your company time and money and offers an objective picture of system vulnerability. The information your company gains can form the basis of a security plan that will permit your information system to run safely and respond rapidly to future threats.
Automated Vulnerability Evaluation
Progent offers consulting in the application of security testing software such as MBSA and GFI LANguard for economically performing a set of programmed network testing checks to uncover possible security holes. Progent has broad knowledge of other security auditing utilities such as NMAP, AMAP Application Scanner, eEye, as well as utilities like Metasploit, Netcat, Hydra, and Nikto. Progent can show you how to understand testing reports and respond appropriately.
Progent can show you how to build security into your business processes, install auditing applications, plan and implement a secure network architecture, and suggest procedures to optimize the security of your IT system. Progent's security professionals are ready to assist you to configure a firewall, design secure remote connectivity to email and business applications, and integrate virtual private network. Learn additional information on Progent's network security audits.
Security Inventory Bundles for Small Businesses
Progent has put together two ultra-affordable security inventory service packages designed to allow small companies to get an objective security evaluation from an accredited security consultant. With Progent's External Network Security Inventory Scan, an engineer runs a comprehensive examination of your network from outside your firewall to uncover possible risks in the security profile you expose to the public. With Progent's Internal Network Security Inventory Scan, a security expert runs a system scan from a secure computer within your company firewall to uncover vulnerabilities to internal assaults. Both security inventory services are configured and run from a protected remote location. The project is directed by a consultant with high-level security accreditations and who produces a report that details and interprets the data collected by the security scan and proposes cost-effective improvements if called for.
Stealth Penetration Analysis Consulting
Stealth intrusion checking is a key part of any comprehensive network security strategy. Progentís security professionals can run extensive penetration checks without the awareness of your company's in-house IT staff. Unannounced penetration testing uncovers whether existing security monitoring tools such as intrusion detection warnings and event log monitoring are properly configured and consistently monitored. Find out more about Progent's network penetration testing support services.
Firewall and Virtual Private Network Support
Progent's background in network security solutions encompasses extensive field work with leading firewalls and Virtual Private Network (VPN) technology from multiple companies such as Cisco, Microsoft, and Juniper. Progent offers the support of consultants who have earned important networking certifications including CCIE and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Integration and Troubleshooting
The new Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver substantially more bang for the buck than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX security appliances for all new installations. After Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X devices can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most popular intrusion protection system. Firepower services provide powerful new features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-premier CCIE network experts can assist you to manage your legacy PIX or Cisco ASA 5500 firewalls and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your company to plan, configure, tune, manage and debug firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Read more information about ASA 5500-X Firewalls with Firepower configuration and troubleshooting support.
Cisco Network Security and Virtual Private Network Support Expertise
Cisco's network security and remote connection products represent a comprehensive line of easy-to-administer security solutions to help safeguard your wired and wireless network infrastructure. Cisco's Virtual Private Network line includes routers, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's expert staff of consultants includes experienced engineers with Cisco Certified Internetwork Expert and CCNP certifications who can help your business to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that fit most closely with your company objectives. Learn more information concerning Progent's Consulting Expertise for Cisco Security Solutions and VPN Appliances.
Engineering Services for Additional Firewall and Virtual Private Network Solutions
Progent offers small and mid-size companies expert support for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and Virtual Private Network security companies including Check Point Software, Juniper Networks, and Symantec. Progent can show you how to create a comprehensive security plan and choose appropriate technologies from multiple suppliers to achieve your security objectives while staying within your budget restraints.
Progent's Flat-rate Managed Services for Information Assurance
Progent's low-cost ProSight line of outsourced network management services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection (EPP) solution that incorporates cutting edge behavior machine learning tools to guard endpoints and servers and VMs against modern malware attacks such as ransomware and file-less exploits, which easily get by legacy signature-matching AV products. ProSight ASM safeguards local and cloud resources and provides a single platform to manage the entire threat progression including protection, infiltration detection, mitigation, cleanup, and forensics. Top capabilities include single-click rollback using Windows Volume Shadow Copy Service and automatic network-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Endpoint Protection
ProSight Enhanced Security Protection (ESP) services deliver affordable multi-layer protection for physical servers and virtual machines, workstations, mobile devices, and Exchange email. ProSight ESP uses adaptive security and advanced heuristics for round-the-clock monitoring and reacting to cyber assaults from all vectors. ProSight ESP delivers firewall protection, penetration alarms, endpoint management, and web filtering via leading-edge technologies incorporated within a single agent accessible from a single console. Progent's data protection and virtualization consultants can help you to plan and configure a ProSight ESP deployment that meets your company's specific needs and that helps you achieve and demonstrate compliance with legal and industry information security standards. Progent will help you define and configure policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alarms that call for urgent action. Progent's consultants can also help you to set up and test a backup and disaster recovery system like ProSight Data Protection Services so you can get back in business quickly from a destructive cyber attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Exchange filtering.
ProSight DPS: Managed Backup
ProSight Data Protection Services from Progent offer small and mid-sized businesses a low cost end-to-end service for reliable backup/disaster recovery (BDR). For a low monthly cost, ProSight Data Protection Services automates your backup processes and allows fast recovery of critical files, applications and VMs that have become lost or damaged due to component breakdowns, software glitches, natural disasters, human error, or malware attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's backup and recovery consultants can provide world-class support to configure ProSight Data Protection Services to to comply with regulatory standards such as HIPAA, FIRPA, PCI and Safe Harbor and, whenever needed, can assist you to recover your critical information. Find out more about ProSight DPS Managed Backup and Recovery.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that uses the technology of leading information security vendors to provide centralized management and comprehensive security for all your inbound and outbound email. The hybrid structure of Email Guard managed service integrates cloud-based filtering with a local gateway appliance to offer complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. Email Guard's Cloud Protection Layer acts as a preliminary barricade and blocks the vast majority of threats from making it to your security perimeter. This decreases your exposure to external attacks and conserves system bandwidth and storage. Email Guard's onsite gateway device adds a further layer of analysis for inbound email. For outgoing email, the on-premises security gateway provides AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also assist Exchange Server to track and protect internal email traffic that originates and ends within your security perimeter. For more details, see Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and applications hosted in a protected Tier III data center on a fast virtual host configured and managed by Progent's IT support professionals. With the ProSight Virtual Hosting model, the client owns the data, the OS software, and the applications. Because the system is virtualized, it can be ported easily to a different hosting solution without requiring a time-consuming and difficult reinstallation procedure. With ProSight Virtual Hosting, your business is not locked into a single hosting service. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, find and safeguard data about your IT infrastructure, procedures, applications, and services. You can quickly locate passwords or serial numbers and be alerted automatically about upcoming expirations of SSLs or domains. By cleaning up and managing your IT infrastructure documentation, you can eliminate up to 50% of time thrown away trying to find critical information about your IT network. ProSight IT Asset Management includes a centralized repository for storing and sharing all documents required for managing your network infrastructure such as recommended procedures and How-To's. ProSight IT Asset Management also offers a high level of automation for gathering and associating IT data. Whether youíre making improvements, performing maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the information you need as soon as you need it. Find out more details about Progent's ProSight IT Asset Management service.
Expert Security Design
Any company ought to have a thoroughly thought out security program that incorporates both proactive procedures and response planning. The pre-attack strategy is a collection of steps intended to minimize vulnerabilities. The post-attack strategy assists your company's network security engineers to assess the damage caused by an attack, repair the network, document the experience, and get the IT network running as rapidly as feasible.
Progent's certified IS security engineers are available to help your company to perform a full risk assessment and create a company-wide security strategy to implement security processes and mechanisms to reduce ongoing assaults and dangers.
CISM Qualified Information Security Engineering Assistance
The Certified Information Security Manager (CISM) organization defines the core competencies and international standards of skill that IT security professionals are expected to learn. It provides business management the confidence that those who have qualified for their CISM credential possess the background and capability to provide effective security management and support services. Progent offers the support of CISM Certified security consultants to help businesses with:
Read more details concerning Progent's CISM Network Security Consulting Professionals.
- Information Security Processes
- Risk Analysis
- Information Security Program Management
- Network Security Administration
- Response Management
CISSP Qualified Security Engineering Support
CISSP denotes expertise with a global standard for network security. The American National Standards Institute has granted the CISSP credential recognition in the field of data protection stipulated by ISO/IEC 17024. Progent offers access to of security experts who have qualified for CISSP certification. Progent can provide a CISSP-certified consultant to help your enterprise in a broad range of security fields including:
Learn additional information about Progent's CISSP Qualified Network Security Consulting Professionals.
- Security Administration Practices
- Security Infrastructure and Paradigms
- Access Management Systems and Methodology
- Software Development Security
- Operations Security
- Site Security
- Encryption/Decryption Mechanisms
- Telecom, LAN and WAN Security
- Disaster Recovery Planning
CISSP-ISSAP Qualified Secure Network Architecture Engineering Assistance
Progent's CISSP-ISSAP Premier IT architecture professionals are experts who have earned ISSAP Certification through thorough examination and significant experience with network security design. The ISSAP credential indicates demonstrated skill in the most challenging requirements of information security architecture bounded by the wider field of information system security knowledge needed for CISSP accreditation. Progent's ISSAP-certified security experts can assist your company with all aspects of architecture security including.
Learn additional details about Progent's ISSAP Qualified Secure Information System Architecture Engineering Expertise.
- Access Control Systems and Techniques
- Telecommunications and System Infrastructure Security
- Data Encryption Solutions
- Requirements Analysis and Security Guidelines
- Business Continuity Planning and Disaster Recovery Planning (DRP)
- Hardware Security
CISA Certified IS Security Auditing Engineering Assistance
The CISA accreditation is a globally recognized achievement that represents mastery in information system security auditing. Accredited by ANSI, the CISA accreditation has candidates pass an extensive examination given by the ISACA professional association. Progent's CISA network security audit consultants can assist your business with:
Learn additional details concerning Progent's CISA Certified Information System Security Auditing Consulting Services.
- IS Audit Services
- IT Enforcement
- Network Assets and Infrastructure Planned Useful Life
- IT Service Delivery
- Protecting Data Assets
- Business Continuity Planning
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA to validate a consultant's skills to design, implement, and support IS control mechanisms to reduce network risk. Progent offers the expertise of a CRISC-certified consultant to assist you to create and execute a business continuity strategy based on leading practices identified by CRISC and geared to match your organization's risk appetite, business goals, and budgetary guidelines. Progent's CRISC network risk mitigation engineers offer a variety of risk assessment services including:
Learn more information concerning Progent's CRISC Risk Management Experts.
- Collect data and review documentation to identify significant vulnerabilities
- Identify legal, regulatory, and business requirements and company standards related to your information system to assess their possible influence on your business goals
- Point out potential threats for your business processes to assist in evaluating your corporate risk
- Develop a risk awareness program and provide seminars to ensure your stakeholders understand information system risk so they can assist with your risk control process
- Match identified risk scenarios to related business processes to help assign risk ownership
- Validate risk appetite with your senior management and major stakeholders to make sure they align
GIAC Accredited Network Security Consulting Assistance
Find out additional information about Progent's GIAC Information Assurance Support.
GIAC (Global Information Assurance Certification) was established in 1999 to validate the knowledge of information technology security engineers. GIAC's mission is to make sure that a certified security consultant has the skills needed to provide services in important categories of network, information, and application software security. GIAC certifications are acknowledged by companies and institutions throughout the world including and the U.S. National Security Agency (NSA). Progent's GIAC-qualified IS security audit specialists can help your IT organization with:
Contact a Certified Security Engineer
To learn how you can access a certified security engineer for online or onsite expertise in Connecticut, call 1-800-993-9400 or go to Remote Network Support.