Company networks in the state of Connecticut now have fast and affordable remote access to Progent's accredited security support specialists to assist with critical security issues. Rates are competitive, billing is per minute, sign-up is fast, and service is world class. Progent also offers help for long-term engagements that requires the knowledge of seasoned security engineers with top industry certifications.

In case your Connecticut organization is located far from major urban areas like Bridgeport, New Haven, Hartford, or Stamford, the availability of local certified network security consultants is often problematic when you have a security disaster. This could mean a loss of revenue for your company, upset clients, idle workers, and distracted management. By utilizing Progent's online services, you have access to a Certified security consultant who can offer expertise whenever you require it to keep your network running and recover your information.

Progent can help you in all your initiatives to defend your information system with support that ranges from network security assessments to creating a comprehensive security strategy. Progent provides economical support to help small and midsize companies to configure and maintain secure networks based on Windows and Cisco technology and that can include computers running UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as BYOD users with Apple iPhones and iPads or Google Android or Windows Phone handsets.

Progent can also help you outsource spam blocking and protection from email-borne security threats. Email Guard is Progent's email filtering and encryption solution that uses the technology of top data security vendors to deliver web-based management and comprehensive protection for your inbound and outbound email. The hybrid architecture of Email Guard managed service integrates a Cloud Protection Layer with a local security gateway appliance to provide advanced defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-based threats. ProSight Email Guard's Cloud Protection Layer acts as a first line of defense and blocks most threats from making it to your network firewall. This reduces your exposure to inbound threats and saves system bandwidth and storage space. ProSight Email Guard's on-premises security gateway device provides a deeper layer of inspection for inbound email. For outbound email, the onsite gateway offers AV and anti-spam protection, DLP, and email encryption. The on-premises security gateway can also enable Microsoft Exchange Server to monitor and safeguard internal email traffic that stays inside your corporate firewall.

Progent's certified professionals are accessible remotely or on site to offer a range of emergency or longer-term network security services including:

  • Perform automated network security evaluations
  • Recuperate rapidly after serious security breaches
  • Configure firewalls from multiple vendors
  • Configure secure solutions for remote and mobile access
  • Install advanced solutions for automatic defense against spam and directory harvest attacks
  • Develop a company-wide security plan with 24x7 security monitoring
  • Provide outsourced Help Desk Support
  • Create an effective backup and disaster recovery solution centered on Microsoft Data Protection Manager automated backup capability
If your network has an immediate need for computer security help, refer to Progent's Urgent Online Technical Support.

Progent's support professionals offer world-class support in key fields of system protection that include analysis, firewall and VPN solutions, and advanced security planning.

System Security Assessment
Progent's certified security engineers can assess the effectiveness of your existing network security environment through exhaustive remote automated testing based on advanced software tools and proven procedures. Progent's experience in this service saves you money and offers an accurate portrayal of weaknesses. The information your IT organization is provided can be used as the foundation of a security strategy that will allow your information system to operate dependably and adapt rapidly to new risks.

Automated Security Assessment
Progent provides consulting in the use of security analysis products such as Microsoft's MBSA and GFI LANguard NSS for economically running a variety of programmed system auditing scans to uncover possible security gaps. Progent has extensive experience with additional network auditing products such as NMAP Port Scanner, AMAP Application Scanner, eEye, as well as utilities such as Metasploit, Netcat, and Nikto. Progent can help you to understand audit reports and respond appropriately.

Progent can show you how to build protection into your company processes, install scanning software, plan and implement a protected system architecture, and recommend procedures to maximize the safety of your IT system. Progent's security consultants are ready to help you set up a firewall, design secure remote access to email and data, and integrate VPN. Learn more on Progent's automated security analysis.

Security Inventory and Evaluation Bundles for Small Businesses
Progent offers two ultra-affordable security inventory service packages designed to allow small businesses to get an impartial network security evaluation from a qualified security expert. With Progent's External Security Inventory Checkup, a security expert administers a comprehensive test of your IT infrastructure from outside your firewall to determine potential risks in the security posture you expose to the public. With Progent's Internal Security Inventory Scan, a security expert executes a system scan from a secure computer inside your company firewall to uncover the risk to inside assaults. The two security inventory packages are set up and run from a secured external site. The process is directed by an engineer who has earned high-level security credentials and who generates a report that details and analyzes the information collected by the scan and suggests practical improvements where called for.

Stealth Penetration Analysis Support Services
Stealth penetration testing is an important component of any serious network security plan. Progentís security professionals can run thorough intrusion checks without the awareness of your company's in-house network support resources. Stealth penetration checking shows whether existing security monitoring systems such as intrusion incident warnings and event history analysis are correctly configured and consistently monitored. Find out additional information on Progent's network penetration analysis support services.

Firewalls and VPN Solutions
Progent's background in security solutions includes extensive familiarity with major firewalls and Virtual Private Network products offered by a variety of companies such as Cisco, Microsoft, and CheckPoint. Progent offers the services of consultants who have earned key networking accreditations including CCIE and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Integration and Debugging
The current Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide significantly more bang for the buck than Cisco's previous firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new deployments. After Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the market's most popular intrusion protection system (IPS). Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-premier CCIE network experts can assist your company to maintain your legacy PIX or ASA 5500 firewalls and migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your organization to plan, configure, optimize, manage and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about Cisco ASA Firewalls with Firepower Services integration and troubleshooting services.

Cisco Network Security and VPN Engineering Expertise
Cisco's network security and offsite connection technology provide a full range of manageable security solutions to help safeguard your local and remote information system. Cisco's VPN line features routers, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's professional staff of consultants includes field-proven engineers with Cisco Certified Internetwork Expert and CCNP qualifications who are able to assist your business to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that align most closely with your business goals. Read more details concerning Progent's Engineering Expertise for Cisco Security Technology and Virtual Private Network Products.

Support Services for Other Firewall and Virtual Private Network Solutions
Progent provides small and mid-size organizations professional consulting for Intrusion Protection products and IPsec VPN products from major firewall and VPN security vendors including WatchGuard, Juniper, and SonicWALL. Progent can show you how to design a comprehensive security strategy and choose the right technologies from a variety of vendors to support your security goals while staying within your budget limits.

Progent's Fixed-price Managed Services for Information Security
Progent's low-cost ProSight line of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance. ProSight managed services offered by Progent include:

ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection (EPP) service that incorporates next generation behavior-based analysis technology to guard endpoints and physical and virtual servers against new malware assaults like ransomware and file-less exploits, which easily get by traditional signature-matching anti-virus products. ProSight Active Security Monitoring safeguards on-premises and cloud resources and provides a unified platform to address the entire threat progression including filtering, identification, mitigation, remediation, and post-attack forensics. Key features include single-click rollback using Windows Volume Shadow Copy Service and automatic network-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection services deliver economical in-depth protection for physical servers and virtual machines, workstations, mobile devices, and Microsoft Exchange. ProSight ESP uses adaptive security and advanced heuristics for round-the-clock monitoring and responding to security assaults from all attack vectors. ProSight ESP delivers two-way firewall protection, penetration alarms, endpoint control, and web filtering through leading-edge technologies packaged within a single agent managed from a unified console. Progent's security and virtualization experts can help your business to plan and configure a ProSight ESP deployment that addresses your organization's specific needs and that allows you demonstrate compliance with government and industry data protection standards. Progent will assist you specify and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alarms that call for urgent attention. Progent's consultants can also assist you to set up and test a backup and restore system like ProSight Data Protection Services so you can recover quickly from a destructive security attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified endpoint security and Microsoft Exchange filtering.

ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services offer small and mid-sized organizations an affordable and fully managed solution for secure backup/disaster recovery. For a fixed monthly cost, ProSight Data Protection Services automates and monitors your backup activities and allows rapid recovery of critical data, apps and virtual machines that have become lost or corrupted due to hardware breakdowns, software glitches, disasters, human mistakes, or malware attacks like ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to an on-promises storage device, or to both. Progent's cloud backup specialists can deliver advanced support to set up ProSight DPS to to comply with regulatory requirements such as HIPPA, FINRA, PCI and Safe Harbor and, when necessary, can assist you to recover your business-critical data. Find out more about ProSight DPS Managed Backup and Recovery.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the infrastructure of leading information security vendors to provide web-based management and comprehensive security for your inbound and outbound email. The powerful architecture of Email Guard managed service integrates a Cloud Protection Layer with a local gateway device to offer advanced protection against spam, viruses, Dos Attacks, DHAs, and other email-based malware. Email Guard's cloud filter acts as a preliminary barricade and keeps most threats from reaching your security perimeter. This reduces your vulnerability to external threats and conserves system bandwidth and storage space. Email Guard's onsite gateway appliance adds a deeper level of analysis for incoming email. For outbound email, the onsite gateway offers anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The on-premises gateway can also help Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends inside your security perimeter. For more details, visit Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and apps hosted in a secure fault tolerant data center on a high-performance virtual machine host set up and maintained by Progent's network support professionals. With Progent's ProSight Virtual Hosting service model, the client retains ownership of the data, the OS software, and the applications. Since the system is virtualized, it can be ported immediately to a different hardware solution without a lengthy and technically risky configuration procedure. With ProSight Virtual Hosting, you are not tied one hosting provider. Find out more about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, update, find and protect data related to your IT infrastructure, processes, business apps, and services. You can instantly find passwords or serial numbers and be alerted automatically about impending expirations of SSLs or warranties. By cleaning up and organizing your IT infrastructure documentation, you can save up to half of time spent searching for vital information about your IT network. ProSight IT Asset Management features a common location for storing and sharing all documents required for managing your business network like recommended procedures and self-service instructions. ProSight IT Asset Management also supports a high level of automation for collecting and associating IT data. Whether youíre making enhancements, performing regular maintenance, or responding to a crisis, ProSight IT Asset Management gets you the knowledge you require the instant you need it. Learn more about Progent's ProSight IT Asset Management service.

Certified Security Design
Any business ought to have a carefully thought out security program that incorporates both pre-attack processes and reaction plans. The pre-attack plan is a collection of steps designed to minimize vulnerabilities. The post-attack plan helps your network security personnel to evaluate the damage resulting from an attack, fix the damage, record the event, and get the IT network operational as quickly as possible.

Progent's certified IT security consultants are available to assist your business to run a complete risk assessment and create a company-wide security plan to implement security policies and mechanisms to mitigate future assaults and dangers.

CISM Certified Information Security Engineering Services
The CISM committee defines the core competencies and global standards of skill that information security professionals are expected to learn. It gives executive management the assurance that consultants who have earned their CISM certification possess the experience and capability to provide effective security management and consulting consulting. Progent offers the support of CISM Premier security consultants to help businesses with:

  • IS Security Processes
  • Risk Analysis
  • Information Security Implementation Management
  • Information Security Administration
  • Recovery Management
Read additional information concerning Progent's CISM Qualified Network Security Support Expertise.

CISSP Certified Security Consulting Support
CISSP certification recognizes mastery of an international standard for information security. The American National Standards Institute has granted the CISSP credential recognition in the area of information security under ISO 17024. Progent can provide access to of security consultants who have earned CISSP accreditation. Progent can give you access to a CISSP-certified consultant to help your organization in a broad range of security areas including:

  • Security Administration Practices
  • Security Architecture and Paradigms
  • Access Management Solutions and Methodology
  • Software Development Security
  • Secure Operations
  • Site Security
  • Encryption/Decryption Technology
  • Telecom, LAN and WAN Security
  • Business Continuity Planning
Read additional details about Progent's CISSP Cybersecurity Support Professionals.

CISSP-ISSAP Accredited Secure System Architecture Consulting Services
Progent's CISSP-ISSAP Premier system architecture professionals are experts who have been awarded ISSAP Certification through rigorous examination and significant work with information security design. The ISSAP credential indicates demonstrated competence in the more complex demands of information security architecture within the broader field of information system security knowledge required for CISSP certification. Progent's ISSAP-certified security specialists can assist your company with all phases of architecture security including.

  • Access Control Systems and Techniques
  • Telecommunications and Network Infrastructure Protection
  • Encryption/Decryption Options
  • Needs Evaluation and Security Guidelines
  • Business Continuity Planning and DRP
  • Site Security
Learn more information about Progent's ISSAP Certified Secure Network Architecture Consulting Services.

CISA Qualified Network Security Auditing Consulting Expertise
The CISA accreditation is an important achievement that represents mastery in network security audit and control. Certified by the American National Standards Institute (ANSI), the CISA credential requires that candidates pass a comprehensive test administered by the ISACA international professional association. Progent's CISA-qualified information security audit engineers can help your IT organization with:

  • IS Audit Process
  • Information Technology Governance
  • Network Assets and Infrastructure Lifecycle Planning
  • IT Service Delivery
  • Protecting Information Resources
  • Business Continuity Planning
Read additional information about Progent's CISA Certified Network Security Auditing Engineering Expertise.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA in 2010 to verify a consultant's ability to plan, deploy, and maintain information system controls to mitigate risk. Progent offers the services of a CRISC-certified engineer to help your company to develop and carry out a workplace continuity or disaster recovery strategy that follows industry best practices promoted by CRISC and crafted to align with your organization's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC-certified network risk mitigation engineers can provide a range of risk identification services including:

  • Gather data and review documentation to identify significant vulnerabilities
  • Identify legal, regulatory, and contractual requirements and company policies related to your network to assess their possible impact on your business goals
  • Point out potential threats for your operational workflows to help in evaluating your corporate risk
  • Create a risk awareness initiative and conduct seminars to ensure your organization appreciate IT risk so they can assist with your risk control program
  • Match identified risk vectors to your associated business procedures to help determine risk responsibility
  • Determine risk tolerance with executive management and major stakeholders to ensure they match
Find out additional information about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Certified Security Consulting Services
GIAC (Global Information Assurance Certification) was established in 1999 to validate the knowledge of IT security professionals. GIAC's mission is to ensure that a certified professional has the skills necessary to deliver support in important areas of system, information, and application security. GIAC certifications are acknowledged by companies and institutions throughout the world including and the U.S. National Security Agency (NSA). Progent's GIAC IS security audit engineers can help your company in the areas of:

Learn additional information concerning Progent's GIAC Information Assurance Expertise.

Contact a Security Engineer
To see how you can access a Progent security consultant for online or onsite support in Connecticut, phone 1-800-993-9400 or visit Remote Network Support.