Business networks inConnecticutcan now get fast and economical remote access to Progent's certified security engineers to resolve urgent security problems. Rates are reasonable, billing is per minute, sign-up is immediate, and support is world class. Progent also provides help for long-term projects that demand the knowledge of senior security engineers with top industry certifications.
In case yourConnecticutorganization is far from major metropolitan neighborhoods such asBridgeport, New Haven, Hartford, or Stamford, access to local accredited network security consultants is often problematic when you have a security disaster. This can result in a loss of income for your business, upset clients, unproductive employees, and distracted management. By utilizing Progent's remote support, you have access to a Certified security engineer ready to deliver expertise when you require it to keep your information system on line and recover your information.
Progent can help you in all your efforts to defend your IT environment with support ranging from network security checks to creating a company-wide security strategy. Progent provides affordable service to help businesses of all sizes to configure and maintain protected IT environments powered by Microsoft Windows and Cisco technology and that may include computers based on UNIX, Linux, Solaris, or Apple Mac OS X platforms as well as BYOD clients with Apple iPhones and iPads or Google Android or Windows Phone devices.
Progent can also show you how to outsource spam blocking and protection from email-borne assaults. Email Guard is Progent's email security solution that incorporates the services and infrastructure of top information security vendors to deliver web-based control and comprehensive protection for your email traffic. The hybrid architecture of Progent's Email Guard managed service combines cloud-based filtering with an on-premises gateway device to offer advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. ProSight Email Guard's cloud filter serves as a first line of defense and blocks the vast majority of unwanted email from making it to your network firewall. This decreases your vulnerability to external attacks and saves system bandwidth and storage space. ProSight Email Guard's on-premises gateway device provides a deeper layer of inspection for inbound email. For outbound email, the local security gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and encryption. The local security gateway can also enable Exchange Server to track and protect internal email traffic that stays within your security perimeter.
Progent's security professionals are available online or on site to offer a range of urgent or project-based IT security services such as:
If your business has an emergency need for IT security support, refer to Progent's Emergency Online Technical Support.
Progent's consultants offer advanced support in key facets of computer protection including analysis, firewall and VPN expertise, and advanced security consulting.
System Security Evaluation
Progent's certified security consultants can assess the vulnerability of your existing computer protection environment through comprehensive remote automated testing via sophisticated software tools and tested procedures. Progent's experience in this testing saves your company consulting fees and assures a detailed portrayal of security holes. The information your business is provided can be used as the basis of a network protection strategy that can allow your network to run safely and react quickly to new risks.
Automated Network Security Analysis
Progent offers expertise in the use of security evaluation software including Microsoft's MBSA and LANguard from GFI for economically performing a set of automatic network auditing scans to identify potential security problems. Progent has broad experience with additional network analysis products such as NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, plus utilities such as Metasploit Framework, Netcat, Socat, and Nikto. Progent can show you how to make sense of audit reports and respond effectively.
Progent can help you design security into your business operations, install auditing tools, plan and deploy a secure system environment, and suggest procedures to maximize the safety of your network. Progent's security professionals are ready to show you how to configure a firewall, design safe remote access to email and business applications, and integrate virtual private network. Find out additional information concerning Progent's automated security assessment.
Security Inventory Scanning Bundles for Small Businesses
Progent has put together two low-cost security inventory scanning bundles intended to allow small companies to get an objective security assessment from a qualified security specialist. With Progent's External Network Security Inventory Scan, an engineer administers an extensive examination of your IT infrastructure from outside your company firewall to uncover possible weaknesses in the security profile you present to the outside world. With Progent's Internal Security Inventory Scan, a security expert runs a network scan from an authorized machine within your company firewall to assess vulnerabilities to inside attacks. Both security inventory services are configured and executed from a protected external location. The process is managed by an engineer who has earned top security credentials and who generates a report that details and interprets the information collected by the security scan and suggests practical remediation if called for.
Network Intrusion Testing Consulting
Stealth penetration testing is an important part of any successful network security plan. Progentís security experts can perform extensive penetration checks without the knowledge of your organization's internal network support resources. Unannounced penetration checking uncovers whether existing security defense systems such as intrusion detection alerts and event history monitoring are correctly set up and actively monitored. Learn additional information concerning Progent's network security penetration analysis support services.
Firewall And Virtual Private Network (VPN) Support
Progent's background in network security solutions includes in-depth field work with major firewalls and Virtual Private Network (VPN) products offered by a variety of vendors such as Cisco, Microsoft, and Symantec. Progent offers the services of consultants who have earned important industry accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Integration and Debugging
The current ASA 5500-X Series of firewalls with Firepower Services deliver substantially more performance than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX firewalls for all new installations. Since Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system (IPS). Firepower services provide powerful new features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can help your company to maintain your existing PIX or Cisco ASA 5500 firewalls or migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your company to plan, configure, optimize, manage and debug firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Find out additional details about ASA Firewalls with Firepower configuration and troubleshooting services.
Cisco Security and Virtual Private Network Consulting Expertise
Cisco's security and offsite access technology represent a comprehensive line of manageable security solutions to help protect your local and remote information system. Cisco's Virtual Private Network line includes routers, firewalls, intrusion detection devices and VPN appliances. Progent's expert staff of consultants includes experienced specialists with Cisco Certified Internetwork Expert and CCNP certifications who can help your company to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that align best with your company goals. Learn additional details about Progent's Support Expertise for Cisco Security Solutions and Virtual Private Network Appliances.
Support Expertise for Additional Firewall and VPN Solutions
Progent offers small and mid-size companies professional support for Intrusion Protection Systems and IPsec VPN solutions from major firewall and VPN security companies such as WatchGuard, Juniper, and SonicWall. Progent can show you how to design a comprehensive security strategy and select the right technologies from a variety of suppliers to achieve your security goals while sticking within your spending restraints.
Progent's Low-Cost Managed Services for Information Security
Progent's low-cost ProSight portfolio of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection solution that utilizes next generation behavior analysis tools to guard endpoints as well as servers and VMs against new malware assaults such as ransomware and file-less exploits, which routinely get by legacy signature-based anti-virus tools. ProSight Active Security Monitoring safeguards on-premises and cloud resources and provides a unified platform to automate the complete threat progression including filtering, detection, containment, cleanup, and post-attack forensics. Key capabilities include one-click rollback using Windows VSS and automatic network-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Endpoint Security
ProSight Enhanced Security Protection (ESP) managed services deliver economical in-depth protection for physical servers and VMs, workstations, mobile devices, and Exchange email. ProSight ESP utilizes contextual security and modern behavior analysis for round-the-clock monitoring and responding to security threats from all vectors. ProSight ESP offers firewall protection, intrusion alerts, endpoint management, and web filtering via cutting-edge tools packaged within a single agent managed from a single console. Progent's security and virtualization consultants can assist you to plan and implement a ProSight ESP deployment that meets your organization's specific requirements and that allows you prove compliance with legal and industry data security regulations. Progent will assist you specify and implement policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alarms that call for immediate attention. Progent's consultants can also assist your company to set up and test a backup and restore system such as ProSight Data Protection Services so you can recover rapidly from a destructive security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Exchange filtering.
ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services provide small and mid-sized businesses a low cost and fully managed solution for secure backup/disaster recovery. For a fixed monthly rate, ProSight DPS automates your backup processes and allows fast recovery of critical data, applications and VMs that have become lost or damaged due to hardware failures, software glitches, disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you protect, recover and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware images/. Critical data can be protected on the cloud, to a local storage device, or mirrored to both. Progent's cloud backup specialists can deliver advanced expertise to configure ProSight Data Protection Services to be compliant with government and industry regulatory standards like HIPAA, FINRA, and PCI and, when needed, can assist you to restore your critical data. Read more about ProSight Data Protection Services Managed Cloud Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the infrastructure of top information security vendors to provide centralized management and comprehensive security for your email traffic. The hybrid architecture of Email Guard managed service combines cloud-based filtering with a local gateway appliance to provide complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based threats. The Cloud Protection Layer serves as a first line of defense and keeps the vast majority of unwanted email from making it to your network firewall. This reduces your exposure to inbound threats and conserves system bandwidth and storage. Email Guard's onsite security gateway appliance provides a deeper layer of inspection for inbound email. For outgoing email, the onsite security gateway provides anti-virus and anti-spam protection, DLP, and email encryption. The on-premises gateway can also assist Microsoft Exchange Server to monitor and protect internal email that stays inside your corporate firewall. For more information, see ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and applications hosted in a secure fault tolerant data center on a high-performance virtual machine host set up and managed by Progent's network support experts. With the ProSight Virtual Hosting model, the customer owns the data, the OS software, and the applications. Since the environment is virtualized, it can be moved immediately to an alternate hosting solution without a time-consuming and technically risky configuration process. With ProSight Virtual Hosting, you are not locked into a single hosting provider. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, maintain, find and safeguard data related to your IT infrastructure, procedures, applications, and services. You can instantly find passwords or serial numbers and be warned automatically about impending expirations of SSLs or domains. By cleaning up and managing your network documentation, you can save as much as half of time spent looking for vital information about your IT network. ProSight IT Asset Management includes a common location for storing and sharing all documents related to managing your network infrastructure such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports a high level of automation for collecting and associating IT information. Whether youíre planning improvements, performing regular maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the knowledge you need the instant you need it. Find out more details about ProSight IT Asset Management service.
Certified Security Consulting
Any business should develop a thoroughly thought out security strategy that includes both proactive procedures and response plans. The proactive strategy is a set of steps that help to minimize vulnerabilities. The post-attack plan assists your network security engineers to evaluate the impact resulting from a security penetration, repair the damage, record the event, and get the IT network running as soon as feasible.
Progent's certified IT security consultants can to assist your company to perform a comprehensive vulnerability assessment and create a company-wide security plan to establish security policies and controls to mitigate future attacks and threats.
CISM Qualified Security Engineering Services
The Certified Information Security Manager (CISM) committee defines the core capabilities and global standards of skill that information security managers are required to learn. CISM gives executive management the assurance that consultants who have earned their CISM credential possess the background and capability to deliver efficient security administration and consulting services. Progent can provide the services of CISM Premier security professionals to help businesses with:
Read additional information about Progent's CISM Network Security Engineering Expertise.
- IS Security Governance
- Risk Analysis
- Information Security Program Management
- IS Security Administration
- Response Management
CISSP Accredited Security Engineering Support
CISSP recognizes mastery of an international standard for data security. ANSI has granted the CISSP credential accreditation in the area of information security stipulated by ISO/IEC 17024. Progent offers access to of security professionals who have earned CISSP certification. Progent can provide a CISSP-certified expert to help your organization in a variety security areas such as:
Find out additional details concerning Progent's CISSP Accredited Cybersecurity Support Professionals.
- Security Management Practices
- Security Infrastructure and Paradigms
- Access Management Solutions and Processes
- Software Development Security
- Secure Operations
- Physical Security
- Cryptography Mechanisms
- Telecom, LAN and WAN Security
- Disaster Recovery Preparedness
CISSP-ISSAP Accredited Secure Information System Architecture Consulting Support
Progent's CISSP-ISSAP Certified information system architecture professionals are consultants who have earned ISSAP status as a result of rigorous testing and extensive work with information security architecture. The ISSAP certification indicates proven competence in the most complex demands of information system security architecture within the wider scope of information system security knowledge required for CISSP accreditation. Progent's ISSAP-certified security experts can assist your company with all aspects of secure network architecture such as.
Read additional information concerning Progent's ISSAP Qualified Secure Network Architecture Consulting Professionals.
- Access Control Systems and Techniques
- Telecommunications and Network Infrastructure Security
- Encryption/Decryption Options
- Requirements Analysis and Security Guidelines
- Business Continuity Planning and Disaster Recovery Planning
- Site Security
CISA Certified Security Auditing Consulting Services
The CISA credential is a globally recognized achievement that represents mastery in IS security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA credential requires that consultants pass an extensive examination administered by the ISACA international professional association. Progent's CISA-qualified IS security audit specialists are available to help your business in the areas of:
Find out additional details about Progent's CISA Accredited IS Security Auditing Consulting Services.
- Information Systems Audit Services
- IT Administration
- Network Assets and Architecture Lifecycle
- Information Technology Support
- Safeguarding Data Resources
- Business Continuity Preparedness
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA in 2010 to validate an IT professional's ability to design, implement, and maintain IS control mechanisms to mitigate risk. Progent can provide the expertise of a CRISC-certified engineer to help your company to create and execute a workplace continuity or disaster recovery plan based on industry best practices promoted by CRISC and geared to match your company's risk appetite, business goals, and IT budget. Progent's CRISC-certified IT risk management specialists can provide a range of risk identification services including:
Read additional details concerning Progent's CRISC Risk Management Experts.
- Gather data and review documentation to evaluate major vulnerabilities
- Identify statutory, industry, and business requirements and company policies associated with your information system to assess their possible influence on your strategic objectives
- Point out potential vulnerabilities for your operational processes to help in analyzing your corporate risk
- Develop a risk awareness initiative and conduct seminars to ensure your organization understand IT risk so they can assist with your risk management process
- Connect key risk scenarios to your associated business processes to help determine risk responsibility
- Validate risk appetite with your senior management and key stakeholders to make sure they are in agreement
GIAC Accredited Security Consulting Assistance
Find out additional information concerning Progent's GIAC Information Assurance Services.
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the skill of computer security engineers. GIAC's mission is to ensure that an accredited professional has the skills appropriate to provide services in important areas of network, data, and software security. GIAC accreditations are acknowledged by businesses and institutions all over the world including and the U.S. National Security Agency (NSA). Progent's GIAC-qualified network security audit consultants are available to help your company with:
Get in Touch with a Progent Security Expert
To see how to contact a Progent security consultant for online or on-premises help in Connecticut, phone 1-800-993-9400 or go to Online Computer Support.