Company networks in Connecticut can now get quick and economical remote help from Progent's certified security support specialists to resolve complex security issues. Rates are reasonable, charges are by the minute, engagement is quick, and service is unbeatable. Progent also offers help for complex projects that requires the expertise of senior security consultants with top security certifications.
In case your Connecticut office is far from major metropolitan neighborhoods including Bridgeport, New Haven, Hartford, or Stamford, help from nearby accredited security professionals could be limited when you have a security disaster. This could mean a loss of income for your company, upset customers, idle workers, and distracted executives. By contacting Progent, you have access to a Certified security consultant who can provide help when you need it to get your information system running and salvage your data.
Progent can help you at any level in your efforts to defend your IT environment with support services that can range from network security audits to creating a comprehensive security plan. Progent offers affordable support to assist small and midsize companies to set up and maintain protected IT environments based on Microsoft Windows and Cisco products and that may include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X operating systems plus BYOD users with Apple iOS handhelds or Google Android or Windows Phone handsets.
Progent can also help you outsource spam blocking and defense against e-mail-based assaults. Email Guard is Progent's email filtering and encryption solution that uses the technology of leading information security vendors to deliver centralized control and world-class security for your inbound and outbound email. The powerful structure of Progent's Email Guard integrates cloud-based filtering with an on-premises gateway device to offer complete defense against spam, viruses, Dos Attacks, DHAs, and other email-borne malware. ProSight Email Guard's Cloud Protection Layer serves as a first line of defense and blocks most threats from making it to your security perimeter. This decreases your vulnerability to inbound threats and saves system bandwidth and storage. ProSight Email Guard's onsite security gateway device provides a further layer of analysis for inbound email. For outgoing email, the on-premises gateway provides anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The on-premises gateway can also enable Exchange Server to track and safeguard internal email that stays within your corporate firewall.
Progent's certified professionals are accessible remotely or on premises to offer a variety of emergency or longer-term computer security services which include:
If your business has an urgent requirement for computer security help, go to Progent's Urgent Online Technical Help.
Progent's security experts can deliver advanced services in vital facets of computer protection that include analysis, firewall/VPN support, and high-level security planning.
System Security Evaluation
Progent's certified security engineers can assess the strength of your existing network security systems by performing exhaustive remote automated testing via advanced utilities and proven techniques. Progent's experience in administering this service saves your company consulting fees and assures an objective picture of security holes. The knowledge your company is provided can form the basis of a network protection strategy that will allow your information system to operate dependably and adapt rapidly to future threats.
Automated Network Security Audits
Progent offers expertise in the application of security testing packages including Microsoft Baseline Security Analyzer and GFI LANguard NSS for affordably performing a set of programmed system auditing scans to uncover possible security holes. Progent has extensive experience with other network auditing tools including NMAP Port Scanner, AMAP Application Scanner, eEye Vulnerability Scanner, as well as tools like Metasploit Framework, Netcat, Hydra, and Nikto. Progent can show you how to understand testing reports and react effectively.
Progent can help you build protection into your business operations, install auditing tools, define and deploy a protected network architecture, and suggest policies to optimize the security of your IT system. Progent's security engineers are available to assist you to set up a firewall, implement secure remote access to email and data, and integrate virtual private network. Learn more on Progent's network security audits.
Security Inventory Service Packages for Small Companies
Progent offers two ultra-affordable security inventory scanning packages intended to enable small companies to get a professional security evaluation from an accredited security consultant. With Progent's External Security Inventory Checkup, an engineer administers an extensive test of your IT infrastructure from outside your firewall to uncover potential weaknesses in the security posture you expose to the outside world. With Progent's Internal Security Inventory Checkup, a security expert executes a system scan from a secure computer within your company firewall to uncover your exposure to inside attacks. Both security inventory services are configured and run from a secured remote location. The project is overseen by a consultant with high-level security credentials and who produces a report that details and interprets the data captured by the security scan and proposes cost-effective remediation if called for.
Network Penetration Analysis Consulting
Stealth intrusion checking is a key component of any comprehensive IT system security strategy. Progentís security experts can run thorough intrusion checks without the awareness of your company's in-house IT staff. Unannounced penetration testing uncovers whether existing security defense tools such as intrusion incident warnings and event history monitoring are correctly set up and consistently checked. Find out additional information concerning Progent's network penetration analysis consulting.
Firewall And Virtual Private Network (VPN) Expertise
Progent's background in network security solutions encompasses in-depth familiarity with leading firewalls and Virtual Private Network (VPN) technology offered by a variety of companies including Cisco, Microsoft, and Juniper. Progent can provide the support of engineers who have earned key industry certifications such as CCIE and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Integration and Debugging
The new ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide significantly more value than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 security appliances for new installations. Since Cisco's purchase of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be configured to enable Firepower Services, built on Sourcefire's Snort product, which is the world's most deployed intrusion protection system. Firepower services bring enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-premier CCIE network consultants can assist you to manage your legacy PIX or Cisco ASA 5500 firewalls and migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your business to plan, configure, optimize, manage and troubleshoot firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. Read additional information about ASA Firewalls with Firepower Services configuration and debugging services.
Cisco Network Security and VPN Engineering Expertise
Cisco's network security and remote connection products offer a complete line of manageable security products to help safeguard your wired and wireless information system. Cisco's VPN line includes routers, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's expert staff of consultants includes field-proven engineers with Cisco Certified Internetwork Expert and CCNP certifications who are able to help your organization to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that align most closely with your company goals. Learn more details concerning Progent's Consulting Services for Cisco Security and Virtual Private Network Appliances.
Engineering Expertise for Additional Firewall and VPN Technology
Progent provides small and mid-size companies professional consulting for Intrusion Protection Systems and IPsec VPN products from major firewall and VPN security vendors including WatchGuard, Juniper, and SonicWall. Progent can help you design a comprehensive security strategy and choose appropriate products from multiple suppliers to achieve your security goals while staying within your budget limits.
Progent's Low-Cost Managed Services for Information Security
Progent's value-priced ProSight portfolio of network management outsourcing services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection service that utilizes cutting edge behavior-based analysis tools to defend endpoint devices and servers and VMs against new malware attacks like ransomware and email phishing, which routinely evade legacy signature-based AV products. ProSight ASM protects local and cloud resources and offers a unified platform to automate the entire malware attack progression including blocking, identification, mitigation, cleanup, and post-attack forensics. Top capabilities include single-click rollback with Windows Volume Shadow Copy Service and real-time network-wide immunization against new threats. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Endpoint Security
Progent's ProSight Enhanced Security Protection services deliver ultra-affordable in-depth protection for physical and virtual servers, workstations, smartphones, and Microsoft Exchange. ProSight ESP utilizes adaptive security and advanced machine learning for round-the-clock monitoring and reacting to security threats from all vectors. ProSight ESP provides two-way firewall protection, penetration alerts, endpoint management, and web filtering through cutting-edge tools packaged within a single agent accessible from a single control. Progent's data protection and virtualization consultants can assist you to plan and configure a ProSight ESP deployment that addresses your organization's unique requirements and that allows you demonstrate compliance with legal and industry data security standards. Progent will assist you define and implement policies that ProSight ESP will manage, and Progent will monitor your network and respond to alerts that require immediate action. Progent can also help you to set up and verify a backup and disaster recovery system like ProSight Data Protection Services (DPS) so you can get back in business quickly from a destructive security attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Exchange email filtering.
ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent offer small and medium-sized businesses a low cost and fully managed service for reliable backup/disaster recovery. For a fixed monthly rate, ProSight Data Protection Services automates your backup processes and enables fast restoration of critical data, applications and VMs that have become lost or corrupted due to component breakdowns, software bugs, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware images/. Critical data can be protected on the cloud, to an on-promises device, or to both. Progent's backup and recovery consultants can deliver advanced expertise to configure ProSight Data Protection Services to be compliant with regulatory standards such as HIPPA, FIRPA, PCI and Safe Harbor and, when needed, can help you to recover your critical data. Find out more about ProSight Data Protection Services Managed Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that uses the infrastructure of leading information security companies to deliver web-based management and world-class protection for your email traffic. The hybrid architecture of Email Guard managed service combines cloud-based filtering with an on-premises security gateway appliance to provide advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The Cloud Protection Layer serves as a first line of defense and keeps most unwanted email from making it to your security perimeter. This decreases your vulnerability to external threats and conserves network bandwidth and storage. Email Guard's on-premises gateway appliance provides a deeper layer of analysis for inbound email. For outgoing email, the local security gateway provides AV and anti-spam filtering, DLP, and email encryption. The local security gateway can also assist Microsoft Exchange Server to track and safeguard internal email that originates and ends inside your corporate firewall. For more information, visit Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and applications hosted in a protected fault tolerant data center on a high-performance virtual host set up and maintained by Progent's IT support experts. With the ProSight Virtual Hosting model, the client retains ownership of the data, the operating system platforms, and the apps. Since the system is virtualized, it can be ported immediately to a different hardware solution without requiring a time-consuming and technically risky configuration procedure. With ProSight Virtual Hosting, you are not tied one hosting provider. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, update, retrieve and safeguard data related to your IT infrastructure, procedures, business apps, and services. You can quickly find passwords or IP addresses and be warned about upcoming expirations of SSLs or warranties. By updating and managing your IT documentation, you can eliminate as much as 50% of time wasted searching for vital information about your IT network. ProSight IT Asset Management includes a centralized repository for storing and sharing all documents required for managing your network infrastructure such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports a high level of automation for gathering and relating IT data. Whether youíre making improvements, performing regular maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the data you need when you need it. Find out more about ProSight IT Asset Management service.
Certified Security Planning
Every business ought to develop a thoroughly thought out security program that includes both preventive procedures and response planning. The pre-attack plan is a set of steps intended to minimize vulnerabilities. The post-attack strategy helps your network security engineers to assess the damage caused by a security penetration, fix the damage, record the experience, and get business functions operational as soon as feasible.
Progent's expert IT security engineers can to assist your business to perform a comprehensive risk evaluation and create a computer security plan to implement security processes and controls to mitigate future assaults and threats.
CISM Qualified Information Security Consulting Services
The CISM organization describes the core capabilities and international standards of skill that information security professionals are expected to master. CISM provides business management the confidence that consultants who have qualified for their CISM credential have the experience and knowledge to deliver effective security management and consulting services. Progent offers the expertise of CISM Premier security professionals to help businesses with:
Find out additional information about Progent's CISM Qualified IS Security Support Expertise.
- IS Security Governance
- Vulnerability Analysis
- Information Security Implementation Management
- IS Security Administration
- Response Management
CISSP Certified Security Engineering Services
CISSP denotes expertise with a worldwide standard for information security. ANSI has granted certification recognition in the area of information protection under ISO/IEC 17024. Progent can provide the services of security professionals who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified expert to help your organization in a broad range of security areas including:
Find out additional information about Progent's CISSP-certified Security Support Services.
- Security Administration Practices
- Security Infrastructure and Paradigms
- Access Management Solutions and Processes
- Applications Development Security
- Secure Operations
- Physical Security
- Encryption/Decryption Mechanisms
- Telecom, Network and WAN Security
- Business Continuity Preparedness
CISSP-ISSAP Qualified Secure System Architecture Consulting Services
Progent's CISSP-ISSAP Certified system architecture professionals are consultants who have earned ISSAP Certification as a result of thorough testing and significant work with network security architecture. The ISSAP certification indicates proven mastery in the most in-depth requirements of IS security architecture within the broader field of IS security expertise required for CISSP certification. Progent's ISSAP-premier security specialists can assist your company with all aspects of secure network architecture including.
Learn more information about Progent's ISSAP Qualified Secure Information System Architecture Consulting Services.
- Access Control Mechanisms and Methodologies
- Telecom and Network Infrastructure Security
- Data Encryption Options
- Needs Analysis and Security Guidelines
- BCP and Disaster Recovery Planning
- Hardware Security
CISA Qualified Information System Security Auditing Consulting Expertise
The Certified Information Systems Auditor accreditation is a prestigious qualification that signifies expertise in information system security audit and control. Certified by the American National Standards Institute (ANSI), the CISA accreditation has candidates undergo a comprehensive examination given by the ISACA international professional association. Progent's CISA information security audit specialists are available to help your business with:
Read more information concerning Progent's CISA Qualified Security Auditing Engineering Services.
- Information Systems Audit Process
- IT Governance
- Systems and Architecture Planned Useful Life
- IT Service Delivery
- Safeguarding Data Assets
- Disaster Recovery Preparedness
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA in 2010 to verify an IT professional's skills to plan, implement, and maintain IS controls to mitigate network risk. Progent can provide the expertise of a CRISC-certified consultant to help you to create and carry out a business continuity strategy based on leading practices identified by CRISC and crafted to match your company's risk appetite, business goals, and budgetary guidelines. Progent's CRISC-certified IT risk management engineers offer a range of risk assessment services including:
Learn more information concerning Progent's CRISC Risk Management Experts.
- Gather data and review documentation to identify major vulnerabilities
- Identify legal, regulatory, and business mandates and company policies associated with your information system to determine their possible influence on your business goals
- Point out possible vulnerabilities for your operational processes to assist in analyzing your corporate risk
- Develop a risk awareness initiative and conduct training to ensure your stakeholders understand IS risk so they can assist with your risk control program
- Connect key risk vectors to your associated business processes to help assign risk ownership
- Validate risk tolerance with executive leadership and key stakeholders to make sure they align
GIAC Qualified Network Security Engineering Support
GIAC was founded in 1999 to validate the skill of network security experts. GIAC's goal is to assure that a certified security consultant possesses the skills needed to deliver support in critical areas of system, data, and program security. GIAC accreditations are recognized by companies and government organizations around the world including and the United States National Security Agency. Progent's GIAC-qualified security audit consultants can help your business with:
Learn additional information concerning Progent's GIAC Information Assurance Services.
- Auditing Perimeters
- Security Incident Response
- Intrusion Detection
- Web Application Security
- SIEM solutions
Talk to a Progent Security Expert
To learn how you can get in touch with a certified security engineer for online or on-premises assistance in Connecticut, call 1-800-993-9400 or visit Online Network Help.