Company networks in the state ofConnecticutcan depend on prompt and affordable online access to Progent's certified security engineers to resolve urgent security issues. Rates are affordable, charges are per minute, sign-up is quick, and service is unbeatable. Progent also offers help for complex projects that demand the knowledge of seasoned security engineers with high-level security certifications.
If yourConnecticutnetwork is far from more populated metropolitan areas such asBridgeport, New Haven, Hartford, or Stamford, access to nearby qualified security engineers could be problematic when you have an emergency. This can cause lost productivity for your business, angry clients, unproductive employees, and defocused management. By calling Progent, you can get in touch with a Premier security professional ready to provide help whenever you have to have it to get your system on line and salvage your information.
Progent can help you in your initiatives to guard your IT environment with support that ranges from security assessments to developing a comprehensive security strategy. Progent offers affordable service to help businesses of all sizes to configure and maintain safe IT environments powered by Microsoft Windows and Cisco products and that can include servers and desktops running UNIX or Linux operating systems plus BYOD clients with Apple iOS handhelds or Google Android or Windows Phone devices.
Progent can also assist you to outsource spam filtering and defense against e-mail-based attacks. Email Guard is Progent's email security platform that uses the technology of top data security vendors to deliver web-based management and world-class security for your inbound and outbound email. The hybrid structure of Progent's Email Guard managed service integrates cloud-based filtering with a local gateway appliance to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne threats. ProSight Email Guard's cloud filter serves as a preliminary barricade and blocks the vast majority of threats from making it to your security perimeter. This decreases your vulnerability to external threats and conserves system bandwidth and storage space. ProSight Email Guard's on-premises gateway device adds a deeper layer of inspection for incoming email. For outgoing email, the local gateway offers anti-virus and anti-spam protection, protection against data leaks, and encryption. The onsite security gateway can also enable Exchange Server to track and protect internal email traffic that stays within your corporate firewall.
Progent's security consultants are available remotely or on site to offer a variety of urgent or project-based IT security services such as:
If your business has an urgent requirement for IT security support, refer to Progent's Urgent Online Technical Help.
Progent's support professionals provide world-class services in vital fields of computer protection that include security assessment, firewall and VPN expertise, and advanced security consulting.
Progent's certified security consultants can assess the strength of your current network security environment by performing exhaustive remote automated testing via advanced utilities and proven techniques. Progent's experience in administering this testing saves you consulting fees and assures an objective portrayal of gaps. The knowledge your IT organization gains can make up the basis of a security strategy that can permit your network to run safely and adapt quickly to new threats.
Automated Network Vulnerability Audits
Progent offers expertise in the use of security analysis utilities including MBSA and GFI LANguard Network Security Scanner for economically performing a variety of automatic network auditing scans to identify possible security weaknesses. Progent has extensive experience with additional network auditing utilities including NMAP Port Scanner, AMAP, eEye Vulnerability Scanner, plus utilities such as Metasploit Framework, Netcat, Socat, and Nikto. Progent can help you to make sense of audit reports and react appropriately.
Progent can show you how to build security into your business processes, install scanning tools, define and deploy a secure network architecture, and recommend procedures to optimize the safety of your IT system. Progent's security professionals are available to help you configure a firewall, design secure remote connectivity to email and business applications, and integrate VPN. Learn more about Progent's network security audits.
Security Inventory Service Bundles for Small Businesses
Progent has put together two low-cost security inventory scanning bundles intended to allow small companies to get an independent security evaluation from a qualified security specialist. With Progent's External Security Inventory Scan, a security expert administers a comprehensive examination of your network from outside your firewalled perimeter to uncover possible weaknesses in the security profile you present to the outside world. With Progent's Internal Security Inventory Checkup, a security expert runs a network scan from a secure machine inside your company firewall to evaluate your exposure to inside attacks. Both security inventory services are configured and executed from a secured remote location. The process is overseen by a consultant with top security accreditations and who produces a document that summarizes and analyzes the information collected by the security scan and suggests practical remediation if called for.
Network Penetration Analysis Support Services
Stealth intrusion checking is an important part of any successful IT system security plan. Progentís security experts can perform thorough penetration tests without the awareness of your organization's internal network support resources. Unannounced penetration checking uncovers whether existing security monitoring tools such as intrusion detection alerts and event log monitoring are correctly configured and actively monitored. Find out additional information on Progent's network security penetration analysis consulting.
Progent's background in network security solutions encompasses extensive familiarity with major firewalls and Virtual Private Network (VPN) technology offered by a variety of vendors including Cisco, Microsoft, and CheckPoint. Progent offers the support of engineers with key industry certifications including Cisco Certified Internetwork Expert and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Configuration and Debugging
The current ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide substantially more performance than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new deployments. After Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X devices can be provisioned to support Firepower Services, based on Sourcefire's Snort technology, which is the world's most deployed intrusion protection system (IPS). Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist you to manage your existing PIX or ASA 5500 firewalls or migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can help you to design, deploy, tune, manage and troubleshoot firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. Read more details about Cisco ASA 5500-X Firewalls with Firepower Services configuration and debugging support.
Cisco Network Security and VPN Consulting Services
Cisco's network security and offsite connection technology offer a comprehensive line of manageable security solutions to help safeguard your local and remote network infrastructure. Cisco's Virtual Private Network product family includes switches, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's expert staff of consultants includes field-proven specialists with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional certifications who are able to help your organization to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that fit best with your company goals. Find out more information about Progent's Support Expertise for Cisco Security Technology and Virtual Private Network Products.
Support Services for Additional Firewall and Virtual Private Network Solutions
Progent offers small and medium size companies professional consulting for Intrusion Protection Systems and IPsec VPN technology from leading firewall and Virtual Private Network security companies such as WatchGuard, Juniper Networks, and SonicWall. Progent can show you how to design a comprehensive security plan and choose the right products from a variety of suppliers to support your security objectives while sticking within your budget limits.
Progent's Fixed-price Managed Services for Information Security
Progent's low-cost ProSight family of network management outsourcing services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance. Managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that incorporates next generation behavior analysis tools to defend endpoints as well as physical and virtual servers against modern malware attacks like ransomware and email phishing, which easily evade traditional signature-based AV products. ProSight ASM protects local and cloud resources and offers a unified platform to automate the entire threat progression including protection, detection, containment, cleanup, and forensics. Key features include one-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) services offer economical in-depth security for physical servers and VMs, workstations, smartphones, and Exchange Server. ProSight ESP utilizes contextual security and modern behavior analysis for continuously monitoring and reacting to cyber assaults from all vectors. ProSight ESP delivers two-way firewall protection, penetration alerts, endpoint control, and web filtering via cutting-edge tools packaged within one agent accessible from a unified console. Progent's data protection and virtualization consultants can help your business to design and configure a ProSight ESP deployment that addresses your company's specific needs and that helps you achieve and demonstrate compliance with legal and industry information protection regulations. Progent will assist you specify and configure policies that ProSight ESP will enforce, and Progent will monitor your network and react to alerts that require immediate attention. Progent can also help your company to install and verify a backup and disaster recovery system like ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous cyber attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Exchange email filtering.
ProSight DPS: Managed Backup
ProSight Data Protection Services provide small and mid-sized businesses an affordable and fully managed solution for secure backup/disaster recovery (BDR). For a low monthly price, ProSight DPS automates your backup activities and enables rapid recovery of critical data, applications and virtual machines that have become unavailable or corrupted due to component failures, software bugs, disasters, human error, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware images/. Important data can be protected on the cloud, to an on-promises storage device, or to both. Progent's cloud backup consultants can deliver advanced support to configure ProSight DPS to to comply with government and industry regulatory standards such as HIPPA, FIRPA, and PCI and, whenever needed, can assist you to recover your critical data. Learn more about ProSight DPS Managed Cloud Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the infrastructure of leading information security vendors to provide web-based management and world-class security for all your inbound and outbound email. The hybrid architecture of Email Guard integrates cloud-based filtering with a local gateway appliance to provide advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The Cloud Protection Layer serves as a preliminary barricade and keeps most unwanted email from making it to your security perimeter. This decreases your vulnerability to external attacks and saves system bandwidth and storage. Email Guard's onsite gateway device adds a deeper level of analysis for incoming email. For outbound email, the onsite gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The local gateway can also help Microsoft Exchange Server to track and safeguard internal email that stays within your security perimeter. For more information, visit Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and applications hosted in a protected Tier III data center on a high-performance virtual machine host set up and maintained by Progent's IT support professionals. Under Progent's ProSight Virtual Hosting service model, the customer owns the data, the OS platforms, and the applications. Because the environment is virtualized, it can be ported easily to an alternate hosting solution without a lengthy and technically risky configuration process. With ProSight Virtual Hosting, your business is not tied one hosting provider. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, update, retrieve and protect information about your IT infrastructure, processes, business apps, and services. You can quickly find passwords or serial numbers and be alerted automatically about impending expirations of SSL certificates ,domains or warranties. By updating and organizing your network documentation, you can eliminate as much as half of time wasted looking for vital information about your network. ProSight IT Asset Management features a common location for storing and collaborating on all documents related to managing your network infrastructure like recommended procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for collecting and relating IT data. Whether youíre making enhancements, performing regular maintenance, or responding to an emergency, ProSight IT Asset Management delivers the knowledge you require as soon as you need it. Learn more about Progent's ProSight IT Asset Management service.
Expert Network Security Planning
Any business should have a thoroughly thought out security strategy that includes both proactive procedures and response planning. The pre-attack plan is a collection of procedures designed to minimize security weaknesses. The reactive strategy assists your company's IT security engineers to evaluate the impact caused by a security penetration, repair the damage, record the experience, and get business functions restored as rapidly as feasible.
Progent's certified information security consultants can to assist your company to perform a complete vulnerability evaluation and define a network security plan to establish security processes and controls to mitigate ongoing attacks and threats.
CISM Accredited Information Security Consulting Expertise
The CISM committee defines the basic competencies and global standards of performance that information security professionals are required to master. It gives business management the confidence that those who have qualified for their CISM certification possess the background and knowledge to provide efficient security management and consulting consulting. Progent offers the services of CISM Certified security professionals to help businesses with:
Find out more details concerning Progent's CISM Qualified Network Security Consulting Professionals.
- Information Security Governance
- Risk Management
- Information Security Implementation Management
- Network Security Management
- Recovery Management
CISSP Qualified Security Engineering Assistance
CISSP certification denotes expertise with a worldwide standard for network security. ANSI has awarded the CISSP credential accreditation in the area of information security defined by ISO/IEC 17024. Progent can provide access to of security consultants who have earned CISSP accreditation. Progent can provide a CISSP-certified expert to help your business in a variety security areas including:
Find out additional information concerning Progent's CISSP Accredited Information Security Support Professionals.
- Security Management Practices
- Security Infrastructure and Paradigms
- Access Management Solutions and Methodology
- Applications Development Security
- Secure Operations
- Physical Security
- Cryptography Mechanisms
- Telecom, LAN and Internet Security
- Business Continuity Planning
CISSP-ISSAP Certified Secure Network Architecture Engineering Assistance
Progent's CISSP-ISSAP Premier network architecture engineers are experts who have been awarded ISSAP Certification as a result of rigorous testing and extensive work with information security architecture. The ISSAP certification represents demonstrated competence in the more complex requirements of information system security architecture bounded by the broader scope of information system security expertise needed for CISSP certification. Progent's ISSAP-premier security experts can assist your company with all phases of architecture security such as.
Learn additional information about Progent's ISSAP Qualified Secure IT Architecture Consulting Professionals.
- Access Management Mechanisms and Methodologies
- Phone System and Network Infrastructure Security
- Encryption/Decryption Solutions
- Needs Analysis and Security Standards
- BCP and Disaster Recovery Planning
- Physical Security
CISA Accredited Security Auditing Consulting Services
The Certified Information Systems Auditor (CISA) accreditation is a recognized achievement that signifies mastery in IS security audit and control. Accredited by the American National Standards Institute, the CISA credential has candidates pass a comprehensive test given by the ISACA professional group. Progent's CISA-certified information security audit specialists can help your IT organization in the areas of:
Get more information about Progent's CISA Certified Network Security Auditing Engineering Services.
- Information Systems Audit Process
- IT Enforcement
- Network Assets and Architecture Planned Useful Life
- Information Technology Support
- Safeguarding Data Resources
- Business Continuity Planning
The CRISC certification program was established by ISACA in 2010 to verify an IT professional's skills to plan, implement, and maintain information system control mechanisms to mitigate network risk. Progent offers the services of a CRISC-certified consultant to help your company to develop and carry out a business continuity strategy that follows industry best practices identified by CRISC and crafted to match your company's risk appetite, business goals, and budgetary guidelines. Progent's CRISC-certified IT risk management engineers can provide a variety of risk identification services including:
Get more information concerning Progent's CRISC Risk Management Experts.
- Gather information and review documentation to help identify major risk scenarios
- Identify statutory, regulatory, and business requirements and organizational policies related to your information system to determine their potential influence on your business goals
- Identify possible threats for your business workflows to assist in analyzing your corporate risk
- Develop a risk awareness initiative and provide seminars to ensure your organization understand information system risk so they can contribute to your risk control process
- Match key risk scenarios to your associated operational processes to help assign risk responsibility
- Validate risk appetite with your senior management and major stakeholders to ensure they align
GIAC Qualified Security Engineering Services
Read more details about Progent's GIAC Information Assurance Support.
GIAC was founded in 1999 to certify the skill of information technology security professionals. GIAC's goal is to assure that an accredited security consultant has the knowledge necessary to provide services in vital categories of network, information, and application security. GIAC certifications are recognized by companies and government organizations all over the world including and the U.S. NSA. Progent's GIAC IS security audit consultants are available to help your IT organization with:
Get in Touch with a Certified Security Engineer
To learn how to get in touch with a certified Progent security consultant for online or on-premises support in Connecticut, call 1-800-993-9400 or go to Remote Computer Help.