Business networks in Connecticut now have fast and affordable remote help from Progent's accredited network security professionals to resolve critical security problems. Rates are reasonable, charges are by the minute, engagement is immediate, and support is unbeatable. Progent also provides help for long-term projects that requires the expertise of senior security consultants with top industry credentials.
If your Connecticut organization is located away from larger metropolitan areas including Bridgeport, New Haven, Hartford, or Stamford, the availability of local accredited security professionals is often problematic during a crisis. This can result in a loss of revenue for your company, upset clients, idle workers, and distracted management. By utilizing Progent, you can get in touch with a Certified security professional ready to offer assistance when you need it to get your computer network on line and restore your data.
Progent can help you in your efforts to guard your IT environment with services that can range from network security assessments to developing a comprehensive security plan. Progent provides affordable support to help businesses of all sizes to set up and manage safe networks powered by Microsoft Windows and Cisco products and that can include computers based on UNIX or Linux platforms plus mobile clients with Apple handhelds or Android or Windows Phone devices.
Ransomware Hot Line: 800-462-8800
Progent's Ransomware Hot Line is designed to guide you to complete the urgent first steps in mitigating a ransomware attack by stopping the bleeding. Progent's online ransomware engineers can assist businesses to locate and quarantine breached servers and endpoints and guard undamaged assets from being penetrated.
If your system has been breached by any version of ransomware, act fast. Get help quickly by calling Progent's 24x7 Ransomware Hot Line at 800-462-8800.
Overview of Progent's Security Services
Progent can show you how to outsource spam filtering and protection from e-mail-based assaults. Email Guard is Progent's email security platform that uses the services and infrastructure of leading information security vendors to deliver centralized management and comprehensive protection for your email traffic. The hybrid structure of Progent's Email Guard integrates a Cloud Protection Layer with a local gateway device to provide advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The Cloud Protection Layer serves as a preliminary barricade and keeps the vast majority of unwanted email from reaching your security perimeter. This reduces your exposure to inbound threats and saves system bandwidth and storage space. ProSight Email Guard's onsite gateway appliance provides a further level of analysis for inbound email. For outbound email, the onsite security gateway offers anti-virus and anti-spam protection, protection against data leaks, and encryption. The local security gateway can also enable Exchange Server to track and protect internal email traffic that stays inside your security perimeter.
Progent's security experts are accessible online or on site to provide a range of emergency or project-based network security services which include:
If your network has an emergency need for IT security support, refer to Progent's Emergency Remote Technical Support.
Progent's engineers can deliver advanced services in vital areas of system security including security assessment, firewalls and VPN, and advanced security consulting.
Progent's certified security consultants can assess the vulnerability of your existing computer security environment through comprehensive remote automated testing based on advanced utilities and proven procedures. Progent's experience in this service saves you money and offers an accurate portrayal of system vulnerability. The knowledge your company gains can be used as the foundation of a network protection plan that will permit your information system to run safely and adapt rapidly to future threats.
Automated Network Security Audits
Progent provides consulting in the use of security evaluation software such as MBSA and GFI LANguard Network Security Scanner for affordably running a variety of automatic system auditing scans to identify potential security weaknesses. Progent has extensive knowledge of additional network analysis products such as NMAP Port Scanner, AMAP, eEye Vulnerability Scanner, as well as tools like SolarWinds, Netcat, Hydra, and Nikto. Progent can show you how to make sense of testing reports and react appropriately.
Progent can show you how to design protection into your business operations, configure auditing tools, plan and implement a secure system architecture, and suggest procedures to maximize the safety of your IT system. Progent's security consultants are ready to show you how to set up a firewall, implement secure remote access to email and business applications, and install VPN. Learn more concerning Progent's network security analysis.
Security Inventory Bundles for Small Companies
Progent offers two ultra-affordable security inventory bundles intended to allow small companies to get an impartial security assessment from a qualified security engineer. With Progent's External Security Inventory Checkup, an engineer runs a comprehensive test of your IT infrastructure from beyond your firewalled perimeter to uncover potential weaknesses in the security profile you present to the public. With Progent's Internal Security Inventory Checkup, an engineer executes a system scan from an authorized computer within your company firewall to evaluate vulnerabilities to internal threats. Both security inventory services are set up and run from a secured remote location. The project is managed by a consultant who has earned top security credentials and who produces a document that summarizes and interprets the data collected by the security scan and proposes cost-effective remediation where appropriate.
Consulting Services for Horizon3.ai's NodeZero Security Assessment Solutions
NodeZero from Horizon3.ai is a leading-edge penetration test (pentest) platform that can deliver continuous, concurrent, automated assessment of your internal and perimeter network so you can identify, prioritize, remediate, and confirm security vulnerabilities before threat actors can exploit them. Progent's pentest experts can help you to deploy NodeZero to perform thorough penetration tests of your perimeter and your internal network in order to determine your current security profile. Progent's NodeZero experts can also help you to harden your network security and can assist you to plan and implement a cohesive cybersecurity ecosystem that simplifies management and delivers maximum protection for on-premises, multi-cloud, and perimeter IT resources. To find out additional details about Progent's threat assessment services powered by on NodeZero's penetration test products, visit Consulting Support for NodeZero's PEN Test Products.
Stealth Penetration Testing Support Services
Stealth intrusion checking is an important component of any serious network security strategy. Progent's security professionals can run thorough intrusion checks without the awareness of your company's internal network support resources. Stealth penetration checking shows whether existing security monitoring systems such as intrusion incident warnings and event history analysis are correctly configured and actively checked. Find out additional information about Progent's network security penetration analysis consulting.
Firewalls and VPN Solutions
Progent's expertise in security solutions includes extensive field work with leading firewalls and Virtual Private Network products offered by multiple companies including Cisco, Microsoft, and CheckPoint. Progent can provide the support of engineers with important industry accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Integration and Debugging
The current Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services deliver substantially more bang for the buck than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new deployments. Since Cisco's purchase of Sourcefire, the whole family of Cisco ASA 5500-X devices can be provisioned to support Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular intrusion protection system. Firepower services provide powerful new features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-premier CCIE network consultants can assist your company to manage your legacy PIX or Cisco ASA 5500 firewalls and migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your company to design, integrate, tune, manage and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Find out more details about Cisco ASA Firewalls with Firepower Services integration and debugging support.
Cisco Security and Virtual Private Network Engineering Expertise
Cisco's security and remote connection products offer a comprehensive line of manageable security solutions to help protect your wired and wireless information system. Cisco's Virtual Private Network line features switches, firewalls, intrusion detection systems and VPN appliances. Progent's professional consulting staff includes experienced specialists with Cisco Certified Internetwork Expert and Cisco Certified Network Professional certifications who are able to assist your business to select Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that fit most closely with your business goals. Read additional details concerning Progent's Engineering Expertise for Cisco Security and VPN Appliances.
Engineering Expertise for Other Firewall and Virtual Private Network Solutions
Progent provides small and medium size organizations professional support for Intrusion Protection Systems and IPsec VPN technology from major firewall and Virtual Private Network security vendors such as Check Point Software, Juniper Networks, and Symantec. Progent can help you create a comprehensive security strategy and select appropriate technologies from multiple suppliers to support your security goals while sticking within your budget limits.
Progent's Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight family of network monitoring and management services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. Managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) solution that incorporates SentinelOne's next generation behavior analysis tools to guard endpoints and physical and virtual servers against new malware attacks such as ransomware and file-less exploits, which routinely evade legacy signature-based AV tools. ProSight Active Security Monitoring safeguards on-premises and cloud resources and offers a single platform to manage the complete malware attack progression including blocking, identification, mitigation, remediation, and forensics. Key capabilities include single-click rollback with Windows Volume Shadow Copy Service and automatic network-wide immunization against newly discovered attacks. Progent is a SentinelOne Partner, dealer, and integrator. Find out more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense powered by SentinelOne technology.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) services offer economical in-depth security for physical and virtual servers, workstations, mobile devices, and Exchange email. ProSight ESP utilizes contextual security and modern behavior analysis for round-the-clock monitoring and responding to cyber threats from all vectors. ProSight ESP provides two-way firewall protection, intrusion alerts, device management, and web filtering via cutting-edge technologies packaged within one agent accessible from a unified control. Progent's security and virtualization consultants can assist you to design and implement a ProSight ESP deployment that meets your company's unique requirements and that helps you demonstrate compliance with legal and industry data security regulations. Progent will assist you specify and implement policies that ProSight ESP will manage, and Progent will monitor your network and respond to alarms that require immediate attention. Progent's consultants can also help you to set up and verify a backup and disaster recovery system like ProSight Data Protection Services (DPS) so you can recover rapidly from a potentially disastrous cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Exchange email filtering.
ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services provide small and mid-sized businesses a low cost end-to-end solution for secure backup/disaster recovery (BDR). Available at a low monthly rate, ProSight DPS automates and monitors your backup activities and allows rapid restoration of vital data, applications and virtual machines that have become unavailable or corrupted as a result of component breakdowns, software glitches, natural disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, applications, system images, plus Hyper-V and VMware images/. Important data can be protected on the cloud, to a local device, or mirrored to both. Progent's cloud backup consultants can provide world-class expertise to set up ProSight DPS to to comply with regulatory standards such as HIPAA, FIRPA, PCI and Safe Harbor and, when needed, can help you to restore your critical data. Read more about ProSight DPS Managed Cloud Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the infrastructure of leading data security companies to deliver web-based control and world-class security for all your email traffic. The hybrid structure of Progent's Email Guard managed service integrates cloud-based filtering with a local security gateway appliance to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The Cloud Protection Layer acts as a first line of defense and keeps the vast majority of threats from reaching your network firewall. This decreases your vulnerability to inbound threats and conserves network bandwidth and storage space. Email Guard's on-premises security gateway appliance provides a deeper layer of inspection for incoming email. For outgoing email, the local gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also help Exchange Server to track and safeguard internal email that stays within your security perimeter. For more details, see Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and apps hosted in a protected fault tolerant data center on a fast virtual host set up and maintained by Progent's network support experts. Under Progent's ProSight Virtual Hosting service model, the client owns the data, the operating system software, and the apps. Since the system is virtualized, it can be moved easily to a different hosting solution without a time-consuming and technically risky configuration procedure. With ProSight Virtual Hosting, you are not locked into one hosting provider. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, update, find and protect information related to your IT infrastructure, processes, applications, and services. You can instantly locate passwords or serial numbers and be warned automatically about impending expirations of SSL certificates ,domains or warranties. By cleaning up and managing your IT infrastructure documentation, you can eliminate up to 50% of time wasted trying to find vital information about your IT network. ProSight IT Asset Management features a common location for holding and collaborating on all documents required for managing your business network like standard operating procedures and How-To's. ProSight IT Asset Management also offers advanced automation for gathering and associating IT information. Whether you're planning improvements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the knowledge you require the instant you need it. Find out more about ProSight IT Asset Management service.
Expert Security Planning
Any company ought to have a carefully thought out security strategy that incorporates both preventive processes and reaction plans. The proactive strategy is a collection of steps intended to reduce security weaknesses. The reactive plan helps your network security engineers to evaluate the impact resulting from a security penetration, fix the network, document the experience, and get business functions restored as rapidly as possible.
Progent's certified IS security consultants are available to help your business to run a comprehensive vulnerability assessment and define a computer security plan to implement security policies and controls to mitigate ongoing attacks and dangers.
CISM Qualified System Security Support Services
The CISM committee describes the core competencies and worldwide standards of performance that information security managers are expected to learn. CISM gives executive management the confidence that consultants who have qualified for their CISM credential have the background and capability to provide efficient security administration and consulting consulting. Progent can provide the services of CISM Premier security professionals to help companies with:
Learn more information about Progent's CISM Information Security Consulting Expertise.
- Network Security Governance
- Vulnerability Analysis
- IS Security Program Management
- Network Security Administration
- Response Planning
CISSP Qualified Security Consulting Services
CISSP denotes mastery of a worldwide standard for data security. ANSI (American National Standards Institute) has awarded certification accreditation in the area of data protection under ISO/IEC 17024. Progent offers the services of security consultants who have earned CISSP certification. Progent can give you access to a CISSP-certified expert to help your organization in a variety security areas including:
Find out additional information concerning Progent's CISSP Cybersecurity Support Expertise.
- Security Administration Practices
- Security Infrastructure and Paradigms
- Access Management Solutions and Methodology
- Software Development Security
- Operations Security
- Site Security
- Cryptography Mechanisms
- Telecom, LAN and WAN Security
- Disaster Recovery Preparedness
CISSP-ISSAP Qualified Secure IT Architecture Consulting Services
Progent's CISSP-ISSAP Certified IT architecture professionals are consultants who have been awarded ISSAP status as a result of rigorous examination and significant experience with network security design. The Information System Security Architecture Professional (ISSAP) certification represents proven mastery in the more in-depth requirements of information system security architecture within the wider scope of information security knowledge required for CISSP certification. Progent's ISSAP-premier security specialists can assist your company with all aspects of architecture security including.
Find out more details concerning Progent's ISSAP Certified Secure Network Architecture Engineering Professionals.
- Access Control Systems and Techniques
- Phone System and Network Protection
- Cryptography Solutions
- Needs Analysis and Security Guidelines
- BCP and Disaster Recovery Planning (DRP)
- Physical Security
CISA Qualified Information System Security Auditing Engineering Support
The Certified Information Systems Auditor (CISA) credential is a globally recognized qualification that indicates expertise in IS security auditing. Accredited by ANSI, the CISA accreditation has candidates undergo an extensive examination administered by the ISACA professional association. Progent's CISA-qualified information security audit consultants are available to assist your company with:
Find out additional details concerning Progent's CISA Accredited Information System Security Auditing Engineering Support.
- Information Systems Audit Services
- Information Technology Enforcement
- Systems and Architecture Lifecycle
- Information Technology Support
- Protecting Data Resources
- Business Continuity Planning
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to validate an IT professional's skills to plan, implement, and support IS control mechanisms to mitigate network risk. Progent can provide the expertise of a CRISC-certified engineer to assist your company to develop and carry out a business continuity plan that follows industry best practices identified by CRISC and crafted to align with your organization's risk appetite, business goals, and budgetary guidelines. Progent's CRISC IT risk management engineers offer a variety of risk assessment services such as:
Get the details about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.
- Gather data and study documentation to evaluate major vulnerabilities
- Inventory legal, regulatory, and business mandates and organizational policies associated with your network to assess their possible impact on your strategic goals
- Identify potential vulnerabilities for your operational workflows to assist in evaluating your corporate risk
- Create a risk awareness initiative and provide seminars to ensure your organization appreciate IS risk so they can assist with your risk control process
- Match key risk scenarios to related business processes to help assign risk responsibility
- Determine risk appetite with your senior management and key stakeholders to ensure they align
GIAC Certified Information System Security Consulting Support
Find out additional details about Progent's GIAC Information Assurance Support.
GIAC was founded in 1999 to certify the knowledge of IT security engineers. GIAC's goal is to assure that a certified professional has the knowledge necessary to provide services in critical areas of system, data, and application security. GIAC accreditations are acknowledged by companies and institutions all over the world including and the U.S. NSA. Progent's GIAC network security audit experts are available to assist your company with:
Contact a Security Engineer
To learn how you can get in touch with a certified Progent security consultant for remote or onsite assistance in Connecticut, phone 1-800-993-9400 or go to Remote Network Support.