Company networks in the state of Connecticut can have prompt and affordable online help from Progent's qualified network security professionals to help with the toughest security problems. Rates are reasonable, charges are per minute, engagement is fast, and service is world class. Progent also offers help for complex projects that requires the services of seasoned security consultants with high-level security certifications.
If your Connecticut small business is situated some distance from major urban areas including Bridgeport, New Haven, Hartford, or Stamford, access to nearby certified security support specialists is often problematic when you have an emergency. This can result in a loss of income for your company, angry clients, idle employees, and defocused executives. By calling Progent, you can get in touch with a Premier security consultant ready to deliver assistance when you have to have it to keep your computer network operating and restore your data.
Progent can help you in all your efforts to protect your IT environment with services that can range from network security assessments to developing a company-wide security strategy. Progent offers affordable service to assist companies of any size to configure and manage secure IT environments based on Windows and Cisco products and that can include servers and desktops based on UNIX, Linux, Sun Solaris, or Mac OS X platforms plus BYOD clients with Apple handhelds or Google Android or Windows Phone handsets.
Progent can also assist you to outsource spam blocking and protection from e-mail-based security threats. Email Guard is Progent's email security solution that incorporates the technology of leading data security vendors to provide centralized control and comprehensive security for all your email traffic. The hybrid architecture of Email Guard combines a Cloud Protection Layer with a local gateway device to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based threats. ProSight Email Guard's cloud filter acts as a preliminary barricade and blocks the vast majority of threats from reaching your network firewall. This reduces your exposure to external threats and saves network bandwidth and storage space. ProSight Email Guard's on-premises gateway appliance provides a further level of analysis for inbound email. For outbound email, the onsite security gateway provides AV and anti-spam filtering, protection against data leaks, and email encryption. The local gateway can also enable Microsoft Exchange Server to monitor and protect internal email that originates and ends within your security perimeter.
Progent's certified consultants are accessible online or in person to offer a range of emergency or project-based network security services including:
If your company has an immediate requirement for IT security help, refer to Progent's Emergency Online Network Help.
- Perform automated network security audits
- Clean up quickly after serious security breaches
- Configure firewalls from multiple vendors
- Implement secure solutions for remote and mobile access
- Deploy effective solutions for protection against viruses, spam and directory harvest attacks
- Help create a company-wide security plan with round-the-clock network monitoring
- Provide outsourced Help Desk Support
- Help Create a practical data backup and business continuity plan built around Microsoft Data Protection Manager backup technology
Progent's support professionals offer advanced support in vital facets of computer protection including security evaluation, firewalls and VPN, and high-level security planning.
System Security Evaluation
Progent's expert security engineers can evaluate the vulnerability of your current computer security environment through exhaustive remote automated analysis via advanced utilities and proven procedures. Progent's experience in this testing saves your company time and money and assures a detailed portrayal of security holes. The knowledge your business is provided can form the foundation of a network protection strategy that can allow your information system to run dependably and respond quickly to future risks.
Automated Network Security Assessment
Progent provides expertise in the application of security evaluation products including Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard Network Security Scanner for economically running a set of automatic network auditing scans to uncover possible security holes. Progent has broad experience with other security analysis products such as NMAP Port Scanner, AMAP Application Scanner, eEye Vulnerability Scanner, as well as tools such as Metasploit Framework, Netcat, Hydra, and Nikto. Progent can help you to understand testing reports and react effectively.
Progent can show you how to design security into your business processes, install auditing applications, define and implement a secure network architecture, and suggest procedures to maximize the security of your IT system. Progent's security engineers are able to help you configure a firewall, implement safe remote connectivity to email and business applications, and integrate virtual private network. Find out additional information on Progent's automated security evaluation.
Security Inventory Service Packages for Small Businesses
Progent offers two ultra-affordable security inventory scanning packages intended to enable small companies to get an objective security evaluation from a certified security expert. With Progent's External Security Inventory Checkup, a security engineer runs an extensive test of your IT infrastructure from outside your firewalled perimeter to determine potential weaknesses in the security profile you expose to the public. With Progent's Internal Security Inventory Scan, a security engineer runs a system scan from an authorized machine inside your firewall to assess vulnerabilities to inside assaults. The two security inventory packages are set up and executed from a secured remote location. The project is directed by a consultant with top security accreditations and who produces a document that summarizes and interprets the data captured by the scan and suggests cost-effective remediation if called for.
Stealth Security Penetration Analysis Support Services
Stealth intrusion checking is a key part of any serious IT system security plan. Progentís security experts can perform extensive intrusion tests without the awareness of your company's in-house network support staff. Unannounced penetration testing uncovers whether existing security monitoring tools such as intrusion incident warnings and event log monitoring are properly set up and consistently checked. Find out additional information on Progent's stealth security penetration analysis consulting.
Progent's background in security solutions encompasses in-depth familiarity with leading firewalls and Virtual Private Network products from a variety of companies such as Cisco, Microsoft, and CheckPoint. Progent offers the services of engineers with important networking certifications including CCIE and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Troubleshooting
The new Cisco ASA 5500-X Family of firewalls with Firepower Services provide significantly more bang for the buck than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 firewalls for new deployments. Since Cisco's purchase of Sourcefire, the whole family of Cisco ASA 5500-X firewalls can be configured to enable Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system. Firepower services provide enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-premier CCIE network consultants can assist your company to manage your existing PIX or Cisco ASA 5500 security appliances or upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your organization to design, configure, optimize, manage and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about ASA 5500-X Firewalls with Firepower Services configuration and troubleshooting support.
Cisco Network Security and VPN Engineering Services
Cisco's network security and remote access technology offer a complete line of easy-to-administer security products to help safeguard your wired and wireless information system. Cisco's Virtual Private Network product family includes routers, firewalls, intrusion detection devices and VPN concentrators. Progent's expert consulting staff includes field-proven engineers with Cisco CCIE and Cisco Certified Network Professional certifications who are able to assist your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that align most closely with your company goals. Read more details about Progent's Support Services for Cisco Security Solutions and Virtual Private Network Products.
Consulting Services for Additional Firewall and Virtual Private Network Solutions
Progent provides small and mid-size companies expert support for Intrusion Protection products and IPsec VPN technology from major firewall and Virtual Private Network security companies including Check Point Software, Juniper, and SonicWALL. Progent can help you design a detailed security strategy and choose the right products from multiple vendors to achieve your security goals while sticking within your budget restraints.
Progent's Flat-rate Managed Services for Information Security
Progent's affordable ProSight line of managed services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) solution that incorporates next generation behavior analysis tools to defend endpoints as well as physical and virtual servers against new malware assaults such as ransomware and file-less exploits, which routinely get by traditional signature-based AV tools. ProSight ASM safeguards local and cloud resources and offers a single platform to manage the entire malware attack lifecycle including filtering, detection, containment, cleanup, and post-attack forensics. Key features include one-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against newly discovered attacks. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Endpoint Security
Progent's ProSight Enhanced Security Protection services deliver economical in-depth security for physical and virtual servers, desktops, mobile devices, and Microsoft Exchange. ProSight ESP uses adaptive security and modern behavior analysis for continuously monitoring and responding to cyber assaults from all vectors. ProSight ESP provides two-way firewall protection, penetration alerts, endpoint control, and web filtering via leading-edge tools packaged within one agent managed from a single control. Progent's security and virtualization experts can help your business to plan and configure a ProSight ESP deployment that meets your company's unique requirements and that allows you prove compliance with government and industry information security standards. Progent will assist you define and configure security policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alarms that call for immediate action. Progent can also help your company to set up and test a backup and disaster recovery system such as ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified endpoint security and Microsoft Exchange filtering.
ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services provide small and mid-sized businesses a low cost end-to-end solution for secure backup/disaster recovery. Available at a low monthly cost, ProSight DPS automates your backup activities and allows fast recovery of vital data, applications and virtual machines that have become lost or damaged due to hardware breakdowns, software glitches, natural disasters, human error, or malware attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to an on-promises storage device, or mirrored to both. Progent's cloud backup specialists can provide advanced support to set up ProSight DPS to be compliant with regulatory standards like HIPPA, FINRA, PCI and Safe Harbor and, when necessary, can help you to restore your critical data. Find out more about ProSight Data Protection Services Managed Cloud Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering service that uses the technology of top data security vendors to provide web-based control and world-class security for your email traffic. The hybrid architecture of Email Guard integrates cloud-based filtering with a local gateway appliance to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. Email Guard's cloud filter acts as a first line of defense and blocks the vast majority of unwanted email from making it to your security perimeter. This decreases your exposure to external threats and conserves network bandwidth and storage space. Email Guard's on-premises security gateway appliance provides a further layer of inspection for incoming email. For outgoing email, the local gateway offers AV and anti-spam protection, DLP, and email encryption. The local gateway can also help Exchange Server to track and protect internal email that stays within your corporate firewall. For more details, visit ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and apps hosted in a protected fault tolerant data center on a fast virtual host configured and maintained by Progent's network support experts. Under Progent's ProSight Virtual Hosting model, the customer retains ownership of the data, the OS platforms, and the apps. Since the system is virtualized, it can be moved immediately to an alternate hardware solution without a lengthy and difficult configuration process. With ProSight Virtual Hosting, you are not tied a single hosting provider. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, maintain, find and protect data related to your network infrastructure, procedures, business apps, and services. You can quickly find passwords or serial numbers and be alerted automatically about upcoming expirations of SSLs ,domains or warranties. By cleaning up and organizing your IT documentation, you can eliminate up to 50% of time spent looking for critical information about your network. ProSight IT Asset Management includes a common repository for holding and sharing all documents related to managing your network infrastructure such as standard operating procedures and How-To's. ProSight IT Asset Management also offers advanced automation for collecting and associating IT information. Whether youíre planning improvements, performing regular maintenance, or responding to an emergency, ProSight IT Asset Management gets you the knowledge you need when you need it. Learn more about Progent's ProSight IT Asset Management service.
Certified Security Design
Any business ought to have a carefully thought out security program that incorporates both proactive processes and response planning. The pre-attack plan is a collection of mechanisms designed to minimize security weaknesses. The reactive strategy helps your company's IT security engineers to assess the impact caused by an attack, repair the damage, record the experience, and get the IT network running as rapidly as possible.
Progent's certified information security consultants can to help your company to run a comprehensive risk evaluation and create a company-wide security plan to implement security policies and controls to mitigate ongoing attacks and dangers.
CISM Certified Information Security Engineering Expertise
The Certified Information Security Manager (CISM) organization defines the basic capabilities and international standards of performance that IT security professionals are expected to learn. It provides executive management the confidence that consultants who have qualified for their CISM credential have the experience and capability to deliver effective security administration and consulting services. Progent can provide the expertise of CISM Certified security professionals to help companies with:
Find out additional information concerning Progent's CISM Accredited IS Security Engineering Expertise.
- IS Security Processes
- Vulnerability Analysis
- Information Security Implementation Management
- Information Security Management
- Response Planning
CISSP Certified Security Consulting Support
CISSP recognizes mastery of an international standard for network security. ANSI (American National Standards Institute) has awarded the CISSP credential recognition in the field of information protection defined by ISO 17024. Progent can provide the services of security professionals who have qualified for CISSP certification. Progent can give you access to a CISSP-certified expert to help your company in a variety security fields including:
Find out more details about Progent's CISSP Qualified Cybersecurity Consulting Services.
- Security Administration Practices
- Security Architecture and Paradigms
- Access Control Solutions and Processes
- Applications Development Security
- Secure Operations
- Site Security
- Data Encryption Mechanisms
- Telecommunications, LAN and Internet Security
- Disaster Recovery Planning
CISSP-ISSAP Accredited Secure Information System Architecture Engineering Services
Progent's CISSP-ISSAP Certified network architecture professionals are consultants who have been awarded ISSAP Certification as a result of rigorous testing and significant work with network security architecture. The ISSAP credential represents demonstrated competence in the most challenging requirements of information security architecture within the broader field of information security expertise required for CISSP certification. Progent's ISSAP-certified security specialists can assist your company with all aspects of architecture security including.
Find out additional information about Progent's ISSAP Accredited Secure Information System Architecture Engineering Services.
- Access Control Mechanisms and Methodologies
- Phone System and System Infrastructure Security
- Encryption/Decryption Solutions
- Needs Analysis and Security Standards
- BCP and DRP
- Hardware Security
CISA Certified IS Security Auditing Engineering Services
The CISA credential is a globally recognized qualification that represents mastery in network security auditing. Certified by the American National Standards Institute (ANSI), the CISA accreditation requires that candidates undergo an extensive examination administered by the ISACA professional association. Progent's CISA-certified network security audit engineers can help your IT organization in the areas of:
Read additional details about Progent's CISA Accredited IS Security Auditing Engineering Services.
- IS Audit Services
- Information Technology Administration
- Systems and Architecture Lifecycle Planning
- Information Technology Service Delivery
- Protecting Data Assets
- Business Continuity Preparedness
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA to validate a consultant's ability to plan, implement, and maintain information system controls to reduce risk. Progent can provide the services of a CRISC-certified engineer to assist your company to create and carry out a business continuity strategy based on leading practices identified by CRISC and crafted to match your company's risk tolerance, business objectives, and IT budget. Progent's CRISC-qualified IT risk management engineers can provide a range of risk assessment services such as:
Find out additional details concerning Progent's CRISC Risk Management Experts.
- Gather data and review documentation to identify significant risk scenarios
- Identify statutory, industry, and contractual requirements and organizational standards associated with your information system to determine their possible influence on your strategic objectives
- Point out possible vulnerabilities for your business processes to assist in analyzing your corporate risk
- Create a risk awareness program and provide seminars to make sure your organization understand IT risk so they can contribute to your risk control process
- Match key risk scenarios to related business procedures to help determine risk responsibility
- Determine risk tolerance with your senior management and key stakeholders to make sure they are in agreement
GIAC Qualified Security Consulting Support
Learn more details concerning Progent's GIAC Information Assurance Services.
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the knowledge of network security experts. GIAC's mission is to make sure that a certified professional has the knowledge necessary to deliver support in key areas of system, information, and application software security. GIAC accreditations are acknowledged by businesses and institutions around the world including and the U.S. National Security Agency. Progent's GIAC-qualified information security audit engineers are available to help your IT organization in the areas of:
Get in Touch with a Security Specialist
To learn how you can access a security consultant for remote or onsite assistance in Connecticut, phone 1-800-993-9400 or go to Online Computer Support.