Company computer networks in the state ofConnecticutnow have prompt and economical remote access to Progent's accredited security support specialists to resolve critical security problems. Rates are competitive, charges are by the minute, sign-up is immediate, and support is world class. Progent also provides help for complex projects that requires the knowledge of seasoned security consultants with top industry credentials.
In case yourConnecticutsmall business is located some distance from more populated urban neighborhoods includingBridgeport, New Haven, Hartford, or Stamford, support from nearby accredited network security support specialists is often problematic during an urgent situation. This can cause lost revenue for your business, upset customers, unproductive workers, and defocused management. By utilizing Progent, you can get in touch with a Certified security professional ready to deliver expertise when you need it to get your information system running and restore your information.
Progent can assist you in all your efforts to defend your information system with services that ranges from network security checks to creating a comprehensive security plan. Progent offers economical service to assist businesses of all sizes to set up and manage secure IT environments powered by Microsoft Windows and Cisco technology and that can include computers running UNIX or Linux operating systems as well as mobile clients with Apple iOS iPhones and iPads or Google Android or Windows Phone devices.
Progent can also help you outsource spam filtering and protection from email-borne assaults. Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of top data security companies to provide web-based management and comprehensive protection for your email traffic. The powerful architecture of Progent's Email Guard managed service combines cloud-based filtering with a local gateway device to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. ProSight Email Guard's cloud filter acts as a preliminary barricade and keeps the vast majority of threats from reaching your network firewall. This reduces your vulnerability to inbound threats and saves network bandwidth and storage. ProSight Email Guard's onsite gateway device adds a deeper level of analysis for inbound email. For outbound email, the local gateway offers anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The on-premises gateway can also help Exchange Server to monitor and protect internal email traffic that originates and ends within your corporate firewall.
Progent's certified consultants are accessible online or on site to offer a range of urgent or project-based IT security services including:
If your network has an urgent requirement for computer security support, refer to Progent's Urgent Online Technical Support.
Progent's consultants offer advanced services in vital areas of computer security that include analysis, firewall and VPN solutions, and advanced security consulting.
System Security Assessment
Progent's certified security engineers can evaluate the vulnerability of your existing network protection environment through comprehensive remote automated testing based on sophisticated software tools and proven procedures. Progent's skill in administering this testing saves you time and money and offers an objective picture of weaknesses. The information your business is provided can be used as the basis of a security strategy that will permit your information system to run dependably and react rapidly to new risks.
Automated Network Security Analysis
Progent offers expertise in the application of security evaluation utilities such as MBSA and GFI LANguard Network Security Scanner for economically running a variety of automatic network testing scans to identify potential security holes. Progent has extensive experience with additional network analysis tools including NMAP Port Scanner, AMAP application mapper, eEye, plus utilities like Metasploit Framework, Hydra, and Nikto. Progent can show you how to understand testing reports and respond effectively.
Progent can show you how to design security into your business operations, configure scanning applications, plan and implement a protected system environment, and suggest procedures to maximize the safety of your IT system. Progent's security professionals are available to assist you to set up a firewall, implement secure remote access to email and business applications, and integrate virtual private network. Find out additional information on Progent's network security assessment.
Security Inventory Service Bundles for Small Companies
Progent has put together two low-cost security inventory and evaluation bundles intended to enable small businesses to receive an objective security assessment from an accredited security specialist. With Progent's External Security Inventory Checkup, a security expert administers a comprehensive examination of your network from beyond your company firewall to uncover possible weaknesses in the security posture you present to the outside world. With Progent's Internal Security Inventory Checkup, a security engineer runs a network scan from a secure machine within your company firewall to assess vulnerabilities to internal attacks. The two security inventory packages are set up and executed from a protected remote location. The process is directed by an engineer who has earned high-level security accreditations and who produces a document that details and analyzes the data captured by the scan and suggests cost-effective remediation if appropriate.
Stealth Penetration Analysis Consulting
Stealth intrusion checking is a key component of any comprehensive network security strategy. Progentís security professionals can perform extensive penetration checks without the knowledge of your organization's in-house IT resources. Stealth penetration checking uncovers whether current security defense systems such as intrusion incident warnings and event history analysis are properly set up and actively monitored. Learn more concerning Progent's network security penetration analysis support services.
Progent's background in security solutions includes extensive field work with leading firewalls and Virtual Private Network (VPN) technology from multiple vendors including Cisco, Microsoft, and Symantec. Progent can provide the support of engineers with important industry certifications including CCIE and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Integration and Debugging
The current ASA 5500-X Family of firewalls with Firepower Services provide significantly more performance than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX security appliances for all new deployments. After Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be configured to enable Firepower Services, built on Sourcefire's Snort technology, which is the world's most deployed network intrusion protection system. Firepower services bring enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-premier CCIE network experts can help you to manage your legacy PIX or ASA 5500 firewalls and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your organization to plan, deploy, optimize, manage and troubleshoot firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. Learn more information about ASA 5500-X Firewalls with Firepower configuration and debugging services.
Cisco Security and Virtual Private Network Engineering Services
Cisco's security and remote connection technology offer a full range of manageable security solutions to help safeguard your local and remote network infrastructure. Cisco's VPN product family includes switches, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's professional consulting staff includes experienced specialists with Cisco CCIE and Cisco Certified Network Professional qualifications who can help your business to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that align best with your company objectives. Find out additional details about Progent's Consulting Services for Cisco Security Technology and Virtual Private Network Products.
Engineering Expertise for Additional Firewall and VPN Products
Progent provides small and medium size organizations expert consulting for Intrusion Protection products and IPsec VPN technology from major firewall and VPN security vendors including Check Point Software, Juniper, and Symantec. Progent can show you how to create a detailed security strategy and select the right technologies from a variety of suppliers to support your security goals while sticking within your budget limits.
Progent's Low-Cost Managed Services for Information Assurance
Progent's affordable ProSight series of managed services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates next generation behavior-based analysis technology to defend endpoints and physical and virtual servers against new malware assaults like ransomware and email phishing, which easily get by traditional signature-based anti-virus tools. ProSight ASM protects on-premises and cloud-based resources and provides a unified platform to manage the complete malware attack progression including blocking, identification, mitigation, cleanup, and forensics. Key capabilities include one-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against newly discovered attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) services offer ultra-affordable multi-layer security for physical servers and VMs, desktops, smartphones, and Microsoft Exchange. ProSight ESP utilizes contextual security and advanced heuristics for continuously monitoring and reacting to cyber assaults from all vectors. ProSight ESP delivers firewall protection, penetration alerts, device management, and web filtering via leading-edge technologies incorporated within a single agent managed from a unified console. Progent's data protection and virtualization experts can assist you to design and configure a ProSight ESP deployment that addresses your company's specific needs and that allows you prove compliance with legal and industry data security regulations. Progent will assist you define and implement policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alerts that require urgent attention. Progent can also assist your company to install and test a backup and restore solution like ProSight Data Protection Services so you can get back in business quickly from a potentially disastrous security attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Exchange email filtering.
ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services offer small and medium-sized businesses a low cost end-to-end solution for reliable backup/disaster recovery. For a low monthly cost, ProSight DPS automates your backup activities and allows rapid restoration of critical data, applications and VMs that have become lost or damaged due to hardware failures, software bugs, natural disasters, human error, or malicious attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware images/. Critical data can be protected on the cloud, to an on-promises device, or to both. Progent's BDR consultants can provide world-class expertise to set up ProSight DPS to be compliant with regulatory standards like HIPAA, FINRA, PCI and Safe Harbor and, when needed, can assist you to restore your critical data. Read more about ProSight DPS Managed Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the infrastructure of leading information security vendors to deliver web-based management and comprehensive protection for your inbound and outbound email. The powerful structure of Email Guard combines cloud-based filtering with a local gateway device to offer complete defense against spam, viruses, Dos Attacks, DHAs, and other email-based malware. The cloud filter serves as a first line of defense and blocks the vast majority of unwanted email from making it to your security perimeter. This reduces your vulnerability to inbound threats and saves system bandwidth and storage. Email Guard's onsite security gateway device adds a further level of inspection for inbound email. For outgoing email, the on-premises gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The onsite gateway can also assist Microsoft Exchange Server to track and safeguard internal email traffic that stays within your corporate firewall. For more details, see ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small business can have its critical servers and apps hosted in a secure Tier III data center on a fast virtual host configured and managed by Progent's IT support professionals. With the ProSight Virtual Hosting model, the customer owns the data, the operating system software, and the apps. Because the environment is virtualized, it can be moved easily to an alternate hosting environment without a lengthy and difficult reinstallation procedure. With ProSight Virtual Hosting, your business is not tied one hosting provider. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, update, find and protect information related to your network infrastructure, procedures, applications, and services. You can quickly find passwords or IP addresses and be warned automatically about upcoming expirations of SSLs ,domains or warranties. By updating and managing your network documentation, you can eliminate as much as 50% of time spent searching for critical information about your IT network. ProSight IT Asset Management includes a centralized location for storing and sharing all documents related to managing your business network such as recommended procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for gathering and associating IT data. Whether youíre making improvements, doing maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the information you need when you need it. Learn more about Progent's ProSight IT Asset Management service.
Expert Security Planning
Any business should have a carefully thought out security program that includes both proactive procedures and reaction plans. The proactive plan is a set of steps intended to reduce security weaknesses. The reactive plan assists your security personnel to evaluate the damage resulting from an attack, fix the system, record the experience, and get the IT network running as soon as possible.
Progent's certified IT security engineers can to help you to perform a comprehensive risk evaluation and create a company-wide security plan to establish security policies and mechanisms to reduce ongoing assaults and dangers.
CISM Certified Security Support Expertise
The CISM committee defines the basic competencies and global standards of performance that IT security managers are required to learn. CISM gives executive management the assurance that consultants who have qualified for their CISM certification possess the experience and knowledge to deliver effective security management and consulting consulting. Progent offers the expertise of CISM Certified security professionals to help companies with:
Read additional information about Progent's CISM Accredited Network Security Support Expertise.
- Information Security Strategies
- Risk Management
- Network Security Implementation Management
- Information Security Management
- Recovery Planning
CISSP Qualified Security Engineering Assistance
CISSP denotes mastery of a worldwide standard for data security. The American National Standards Institute has granted certification accreditation in the field of information security defined by ISO/IEC 17024. Progent offers the services of security professionals who have earned CISSP certification. Progent can provide a CISSP-certified consultant to help your enterprise in a broad range of security areas such as:
Read more information concerning Progent's CISSP Accredited Security Support Services.
- Security Management Practices
- Security Architecture and Paradigms
- Access Control Solutions and Methodology
- Applications Development Security
- Secure Operations
- Site Security
- Cryptography Technology
- Telecommunications, Network and WAN Security
- Disaster Recovery Planning
CISSP-ISSAP Accredited Secure System Architecture Consulting Expertise
Progent's CISSP-ISSAP Premier network architecture professionals are consultants who have been awarded ISSAP Certification through thorough testing and extensive work with information security architecture. The ISSAP certification represents demonstrated mastery in the more in-depth requirements of information system security architecture bounded by the wider scope of IS security expertise required for CISSP certification. Progent's ISSAP-premier security experts can assist your company with all phases of architecture security including.
Learn additional details concerning Progent's ISSAP Qualified Secure IT Architecture Support Services.
- Access Control Systems and Methodologies
- Phone System and Network Protection
- Cryptography Solutions
- Needs Evaluation and Security Guidelines
- Business Continuity Planning and DRP
- Physical Security
CISA Certified Information System Security Auditing Consulting Assistance
The Certified Information Systems Auditor accreditation is a recognized achievement that signifies mastery in IS security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA accreditation has consultants pass a comprehensive test administered by the ISACA international professional association. Progent's CISA-qualified information security audit engineers are available to assist your business in the areas of:
Read more details concerning Progent's CISA Accredited Information System Security Auditing Consulting Assistance.
- IS Audit Services
- Information Technology Administration
- Systems and Infrastructure Lifecycle
- IT Support
- Safeguarding Data Resources
- Business Continuity Planning
Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC certification program was initiated by ISACA in 2010 to validate an IT professional's ability to design, deploy, and support IS controls to mitigate network risk. Progent can provide the expertise of a CRISC-certified engineer to assist you to create and carry out a workplace continuity or disaster recovery plan based on leading practices promoted by CRISC and crafted to match your organization's risk appetite, business objectives, and IT budget. Progent's CRISC-qualified IT risk mitigation specialists offer a range of risk assessment services including:
Learn the details about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Collect information and review documentation to help identify significant vulnerabilities
- Identify statutory, regulatory, and business requirements and organizational policies associated with your information system to determine their potential impact on your strategic goals
- Identify potential vulnerabilities for your business processes to assist in evaluating your corporate risk
- Develop a risk awareness initiative and conduct training to make sure your stakeholders understand IS risk so they can contribute to your risk control program
- Connect key risk scenarios to your associated business processes to help determine risk responsibility
- Determine risk appetite with your senior leadership and key stakeholders to make sure they align
GIAC Certified Network Security Engineering Services
GIAC was established in 1999 to validate the skill of information technology security experts. GIAC's mission is to make sure that an accredited security consultant has the skills necessary to deliver services in key areas of network, data, and application software security. GIAC certifications are recognized by businesses and government organizations all over the world including and the U.S. NSA. Progent's GIAC-qualified information security audit specialists can help your business in the areas of:
Read more details concerning Progent's GIAC Information Assurance Expertise.
- Auditing IT Infrastructure
- Security Incident Handling
- Intrusion Detection
- Web-based Services Security
- SIEM solutions
Talk to a Security Expert
To learn how to get in touch with a Progent security engineer for online or onsite support in Connecticut, call 1-800-993-9400 or visit Remote Computer Support.