Small business computer networks in the state of Connecticut now have prompt and economical online access to Progent's certified security support specialists to assist with complex security issues. Rates are reasonable, charges are by the minute, engagement is immediate, and support is unbeatable. Progent also provides assistance for long-term projects that demand the knowledge of seasoned security engineers with top security certifications.
If your Connecticut office is some distance from more populated urban neighborhoods such as Bridgeport, New Haven, Hartford, or Stamford, contact with nearby accredited network security support specialists is often limited during a security disaster. This can cause lost income for your business, upset clients, idle employees, and distracted executives. By utilizing Progent's online services, you can get in touch with a Certified security professional who can provide assistance whenever you require it to keep your computer network on line and salvage your data.
Progent can help you in all your efforts to protect your network with support services ranging from network security checks to developing a company-wide security strategy. Progent offers affordable support to assist businesses of all sizes to design and manage secure IT environments based on Windows and Cisco technology and that can include computers based on UNIX or Linux platforms as well as mobile clients with Apple iOS handhelds or Google Android or Windows Phone handsets.
Progent can also show you how to outsource spam filtering and protection from email-borne attacks. Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of leading data security vendors to deliver web-based control and comprehensive security for your inbound and outbound email. The hybrid architecture of Progent's Email Guard integrates cloud-based filtering with a local gateway device to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. ProSight Email Guard's Cloud Protection Layer acts as a first line of defense and blocks most threats from reaching your network firewall. This reduces your vulnerability to external attacks and saves system bandwidth and storage space. ProSight Email Guard's onsite gateway device provides a deeper level of inspection for inbound email. For outgoing email, the on-premises security gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and encryption. The onsite gateway can also enable Microsoft Exchange Server to track and safeguard internal email that stays inside your security perimeter.
Progent's security professionals are available remotely or on site to offer a range of emergency or longer-term network security services which include:
If your business has an urgent need for IT security help, go to Progent's Emergency Remote Technical Support.
- Perform thorough security audits
- Recuperate rapidly after serious security breaches
- Configure hardware and software firewalls
- Configure secure techniques for remote and mobile connectivity
- Deploy advanced applications for automatic protection against viruses, spam and DHAs
- Develop a comprehensive security plan with proactive security monitoring
- Provide comprehensive Call Center Services
- Help Create a practical data backup and recovery strategy built around Microsoft Data Protection Manager backup capability
Progent's engineers can deliver world-class support in vital facets of computer protection that include security assessment, firewall and VPN solutions, and high-level security planning.
System Security Audits
Progent's expert security engineers can evaluate the strength of your existing network protection implementation by performing comprehensive remote automated analysis based on advanced software tools and proven procedures. Progent's experience in this service saves your company consulting fees and offers a detailed picture of system vulnerability. The knowledge your company is provided can be used as the foundation of a security plan that will permit your network to operate safely and adapt rapidly to future risks.
Automated Network Security Analysis
Progent offers consulting in the use of security analysis software including Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard NSS for economically running a variety of programmed system testing scans to identify potential security vulnerabilities. Progent has extensive experience with other security auditing utilities including NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, plus utilities such as SolarWinds, Hydra, and Nikto. Progent can show you how to make sense of audit reports and respond appropriately.
Progent can help you build protection into your company processes, install scanning software, plan and deploy a protected network environment, and recommend policies to maximize the security of your network. Progent's security professionals are available to show you how to set up a firewall, design secure remote connectivity to email and business applications, and integrate VPN. Learn additional information about Progent's network security assessment.
Security Inventory Scanning Packages for Small Companies
Progent has put together two ultra-affordable security inventory packages intended to allow small companies to receive an independent network security assessment from an accredited security expert. With Progent's External Network Security Inventory Scan, a security engineer administers a comprehensive examination of your IT infrastructure from beyond your firewall to determine potential risks in the security profile you present to the outside world. With Progent's Internal Network Security Inventory Checkup, a security engineer executes a network scan from a secure computer inside your company firewall to assess the risk to inside attacks. Both security inventory services are configured and executed from a protected external site. The process is overseen by an engineer who has earned top security credentials and who produces a document that details and interprets the data captured by the security scan and suggests cost-effective remediation where called for.
Network Penetration Analysis Support Services
Stealth intrusion checking is a key part of any comprehensive IT system security strategy. Progentís security experts can run thorough intrusion checks without the awareness of your organization's internal IT resources. Stealth penetration checking uncovers whether current security defense tools such as intrusion detection alerts and event history monitoring are properly set up and actively monitored. Find out additional information on Progent's stealth penetration analysis support services.
Progent's expertise in security solutions includes extensive familiarity with leading firewalls and Virtual Private Network technology offered by a variety of vendors such as Cisco, Microsoft, and Symantec. Progent can provide the support of engineers with important networking certifications including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Troubleshooting
The latest generation of Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver significantly more performance than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 firewalls for all new deployments. Since Cisco's acquisition of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the world's most popular intrusion protection system (IPS). Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help your company to manage your current PIX or ASA 5500 security appliances or migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite support for ASA 5500-X firewalls with Firepower Services and can help your organization to plan, deploy, optimize, manage and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about ASA Firewalls with Firepower integration and debugging support.
Cisco Security and VPN Engineering Expertise
Cisco's security and remote connection products offer a full range of manageable security solutions to help safeguard your wired and wireless information system. Cisco's VPN line includes switches, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's expert staff of consultants includes field-proven engineers with Cisco CCIE and Cisco Certified Network Professional qualifications who can assist your organization to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that align best with your business objectives. Find out more details concerning Progent's Engineering Services for Cisco Security Solutions and Virtual Private Network Appliances.
Support Services for Other Firewall and Virtual Private Network Products
Progent offers small and medium size organizations expert consulting for Intrusion Protection Systems and IPsec VPN technology from major firewall and VPN security vendors including WatchGuard, Juniper, and Symantec. Progent can help you create a comprehensive security strategy and choose appropriate products from multiple vendors to achieve your security objectives while sticking within your spending restraints.
Progent's Fixed-price Managed Services for Information Security
Progent's low-cost ProSight series of network management outsourcing services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection (EPP) service that utilizes cutting edge behavior machine learning tools to guard endpoints and physical and virtual servers against modern malware assaults like ransomware and email phishing, which routinely escape legacy signature-matching anti-virus products. ProSight Active Security Monitoring protects local and cloud resources and provides a single platform to automate the complete malware attack lifecycle including protection, infiltration detection, mitigation, remediation, and forensics. Key features include single-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection managed services deliver ultra-affordable in-depth security for physical and virtual servers, desktops, mobile devices, and Exchange Server. ProSight ESP utilizes adaptive security and advanced heuristics for round-the-clock monitoring and responding to security threats from all attack vectors. ProSight ESP provides two-way firewall protection, penetration alarms, endpoint control, and web filtering through cutting-edge technologies packaged within one agent accessible from a unified control. Progent's data protection and virtualization experts can assist you to design and implement a ProSight ESP environment that addresses your company's unique requirements and that allows you prove compliance with government and industry data protection regulations. Progent will help you specify and configure policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alarms that call for urgent action. Progent can also assist you to set up and verify a backup and disaster recovery system like ProSight Data Protection Services (DPS) so you can recover rapidly from a destructive security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Microsoft Exchange email filtering.
ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services from Progent offer small and medium-sized organizations a low cost and fully managed solution for secure backup/disaster recovery (BDR). For a low monthly price, ProSight Data Protection Services automates your backup activities and allows fast restoration of critical data, applications and virtual machines that have become lost or corrupted as a result of component failures, software bugs, disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images, plus Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to a local device, or mirrored to both. Progent's BDR specialists can deliver world-class support to set up ProSight DPS to to comply with regulatory standards such as HIPPA, FIRPA, and PCI and, when necessary, can assist you to restore your business-critical data. Read more about ProSight Data Protection Services Managed Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the technology of top information security vendors to provide web-based management and comprehensive protection for your inbound and outbound email. The powerful structure of Email Guard managed service integrates cloud-based filtering with an on-premises gateway appliance to provide advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based malware. The cloud filter acts as a preliminary barricade and keeps the vast majority of threats from reaching your network firewall. This reduces your exposure to inbound threats and conserves network bandwidth and storage space. Email Guard's on-premises security gateway appliance provides a deeper layer of inspection for inbound email. For outgoing email, the on-premises gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also help Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends within your corporate firewall. For more details, visit ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its key servers and apps hosted in a secure fault tolerant data center on a high-performance virtual machine host set up and maintained by Progent's network support professionals. With Progent's ProSight Virtual Hosting service model, the client retains ownership of the data, the OS software, and the applications. Because the environment is virtualized, it can be ported easily to an alternate hardware environment without a time-consuming and technically risky configuration process. With ProSight Virtual Hosting, your business is not locked into a single hosting service. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, update, retrieve and protect data related to your network infrastructure, processes, applications, and services. You can quickly locate passwords or IP addresses and be alerted about upcoming expirations of SSL certificates or warranties. By updating and managing your IT documentation, you can save up to half of time wasted looking for critical information about your network. ProSight IT Asset Management features a centralized location for holding and sharing all documents required for managing your business network such as standard operating procedures and How-To's. ProSight IT Asset Management also offers advanced automation for collecting and relating IT information. Whether youíre planning enhancements, doing maintenance, or responding to an emergency, ProSight IT Asset Management gets you the knowledge you require when you need it. Learn more details about Progent's ProSight IT Asset Management service.
Certified Security Design
Every company should have a carefully thought out security strategy that incorporates both preventive procedures and response planning. The proactive strategy is a collection of steps designed to reduce vulnerabilities. The reactive strategy helps your company's IT security personnel to evaluate the impact caused by an attack, fix the network, document the experience, and get business functions operational as soon as possible.
Progent's expert IT security consultants are available to assist your company to perform a comprehensive risk assessment and create a network security strategy to establish security processes and controls to minimize future attacks and threats.
CISM Certified Information Security Engineering Expertise
The CISM organization defines the basic competencies and international standards of skill that information security professionals are expected to master. It gives business management the confidence that those who have qualified for their CISM certification possess the experience and knowledge to deliver effective security management and support services. Progent can provide the support of CISM Certified security professionals to help companies with:
Find out more information about Progent's CISM Accredited IS Security Support Professionals.
- Information Security Strategies
- Vulnerability Analysis
- Information Security Implementation Management
- IS Security Management
- Recovery Management
CISSP Accredited Security Consulting Assistance
CISSP certification denotes mastery of an international standard for network security. ANSI has awarded certification accreditation in the area of information protection defined by ISO 17024. Progent offers access to of security professionals who have qualified for CISSP certification. Progent can provide a CISSP-certified professional to help your organization in a variety security areas including:
Learn more information concerning Progent's CISSP Accredited Network Security Support Services.
- Security Management Procedures
- Security Infrastructure and Paradigms
- Access Control Solutions and Methodology
- Software Development Security
- Secure Operations
- Physical Security
- Cryptography Technology
- Telecommunications, LAN and Internet Security
- Business Continuity Planning
CISSP-ISSAP Qualified Secure System Architecture Engineering Services
Progent's CISSP-ISSAP Premier network architecture professionals are experts who have earned ISSAP status as a result of rigorous examination and significant experience with information security architecture. The Information System Security Architecture Professional (ISSAP) credential indicates demonstrated mastery in the more complex requirements of information security architecture bounded by the wider scope of IS security expertise required for CISSP certification. Progent's ISSAP-premier security experts can assist your company with all aspects of secure network architecture such as.
Find out additional information about Progent's ISSAP Accredited Secure Information System Architecture Support Expertise.
- Access Control Systems and Methodologies
- Telecommunications and Network Infrastructure Security
- Cryptography Solutions
- Requirements Evaluation and Security Standards
- Business Continuity Planning and Disaster Recovery Planning (DRP)
- Hardware Security
CISA Certified Security Auditing Engineering Expertise
The CISA accreditation is a prestigious achievement that signifies expertise in IS security audit and control. Certified by ANSI, the CISA accreditation has consultants undergo an extensive test given by the ISACA professional association. Progent's CISA-certified network security audit engineers can assist your company in the areas of:
Read additional details about Progent's CISA Certified IS Security Auditing Consulting Support.
- Information Systems Audit Process
- IT Administration
- Network Assets and Infrastructure Lifecycle
- Information Technology Service Delivery
- Safeguarding Data Assets
- Disaster Recovery Planning
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA to validate a consultant's ability to plan, deploy, and maintain IS control mechanisms to mitigate network risk. Progent can provide the services of a CRISC-certified engineer to assist your company to create and carry out a business continuity strategy based on industry best practices identified by CRISC and geared to align with your company's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC-qualified IT risk mitigation specialists can provide a range of risk identification services such as:
Find out more information about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Collect data and study documentation to help identify significant vulnerabilities
- Identify statutory, industry, and contractual mandates and organizational standards associated with your network to assess their potential influence on your business objectives
- Identify potential vulnerabilities for your operational workflows to assist in evaluating your corporate risk
- Create a risk awareness program and provide seminars to make sure your stakeholders appreciate information system risk so they can assist with your risk control program
- Match key risk scenarios to related operational procedures to help assign risk ownership
- Determine risk tolerance with executive leadership and key stakeholders to ensure they match
GIAC Accredited Network Security Consulting Support
GIAC was founded in 1999 to certify the skill of IT security experts. GIAC's goal is to make sure that a certified security consultant has the knowledge necessary to deliver support in vital areas of system, information, and application software security. GIAC accreditations are acknowledged by companies and government organizations around the world including and the U.S. National Security Agency. Progent's GIAC IS security audit specialists are available to assist your IT organization in the areas of:
Find out more information concerning Progent's GIAC Information Assurance Services.
- Assessing Networks
- Incident Handling
- Intrusion Detection
- Web Application Security
- SIEM solutions
Get in Touch with a Security Expert
To learn how you can contact a certified security consultant for online or onsite support in Connecticut, phone 1-800-993-9400 or visit Online Computer Help.