Company IT networks in New York can have quick and affordable remote access to Progent's accredited security experts to help with critical security issues. Rates are reasonable, billing is by the minute, engagement is immediate, and support is world class. Progent also provides assistance for long-term engagements that requires the services of senior security engineers with high-level industry credentials.
In case your New York office is based away from more populated metropolitan areas such as New York City, Buffalo, Rochester, Yonkers, or Syracuse, access to nearby certified security support specialists is often problematic when there's a crisis. This could mean a loss of income for your business, angry customers, idle employees, and distracted management. By calling Progent's remote support, you have access to a Premier security engineer ready to provide expertise when you have to have it to get your information system on line and restore your data.
Progent can assist you in your efforts to defend your network with support that ranges from security checks to developing a company-wide security strategy. Progent offers economical service to assist small and midsize companies to design and maintain safe networks based on Windows and Cisco products and that may include computers running UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as BYOD clients with Apple iOS iPhones and iPads or Android or Windows Phone handsets.
Progent can also help you outsource spam blocking and defense against e-mail-based assaults. Email Guard is Progent's email security solution that uses the services and infrastructure of top data security companies to provide web-based control and world-class protection for all your inbound and outbound email. The powerful structure of Progent's Email Guard integrates a Cloud Protection Layer with an on-premises gateway device to provide complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. ProSight Email Guard's cloud filter acts as a preliminary barricade and blocks most unwanted email from reaching your security perimeter. This decreases your vulnerability to inbound attacks and saves system bandwidth and storage. ProSight Email Guard's onsite security gateway appliance adds a further level of inspection for inbound email. For outbound email, the on-premises gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The on-premises security gateway can also help Microsoft Exchange Server to monitor and safeguard internal email traffic that stays inside your corporate firewall.
Progent's security engineers are available remotely or on premises to provide a range of urgent or longer-term network security services including:
If your network has an urgent requirement for computer security help, refer to Progent's Urgent Remote Technical Help.
Progent's support professionals offer advanced support in key facets of computer protection that include auditing, firewalls and VPN, and advanced security consulting.
Progent's certified security engineers can assess the strength of your current computer security environment by performing exhaustive remote automated testing via sophisticated utilities and proven techniques. Progent's skill in administering this service saves your company consulting fees and assures an objective picture of weaknesses. The information your IT organization gains can be used as the foundation of a network protection plan that can allow your information system to run dependably and respond quickly to future risks.
Automated Vulnerability Analysis
Progent provides consulting in the application of security testing products such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard Network Security Scanner for affordably running a variety of programmed system auditing checks to identify possible security problems. Progent has broad knowledge of additional network auditing products including NMAP Port Scanner, AMAP, eEye Vulnerability Scanner, plus utilities such as SolarWinds, Netcat, Socat, and Nikto. Progent can help you to make sense of audit reports and respond appropriately.
Progent can show you how to build security into your business processes, configure auditing tools, define and deploy a protected system architecture, and suggest policies to maximize the safety of your IT system. Progent's security engineers are able to help you configure a firewall, implement safe remote access to email and data, and install VPN. Learn additional information on Progent's automated security audits.
Security Inventory and Evaluation Packages for Small Businesses
Progent has put together two low-cost security inventory and evaluation packages intended to enable small businesses to get an objective security assessment from a certified security specialist. With Progent's External Security Inventory Scan, a security engineer administers an extensive test of your IT infrastructure from outside your company firewall to uncover possible risks in the security posture you present to the public. With Progent's Internal Network Security Inventory Scan, a certified security professional executes a network scan from an authorized computer inside your company firewall to uncover the risk to inside assaults. Both security inventory packages are set up and executed from a protected remote site. The process is managed by an engineer with top security credentials and who produces a report that summarizes and analyzes the information collected by the scan and proposes cost-effective improvements where appropriate.
Network Intrusion Analysis Support Services
Stealth intrusion checking is an important part of any serious network security strategy. Progentís security experts can run thorough intrusion tests without the awareness of your company's internal IT staff. Stealth penetration checking shows whether current security defense systems such as intrusion detection alerts and event log monitoring are correctly configured and consistently monitored. Learn more concerning Progent's network security penetration testing consulting.
Firewall and Virtual Private Network Support
Progent's expertise in security solutions includes extensive familiarity with leading firewalls and Virtual Private Network (VPN) products offered by a variety of vendors such as Cisco, Microsoft, and Symantec. Progent can provide the services of consultants who have earned key networking accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Debugging
The latest generation of ASA 5500-X Series of firewalls with Firepower Services provide substantially more value than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 security appliances for all new installations. After Cisco's purchase of Sourcefire, the whole family of ASA 5500-X firewalls can be configured to support Firepower Services, based on Sourcefire's Snort technology, which is the market's most deployed network intrusion protection system (IPS). Firepower services provide powerful new features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can help your company to manage your existing PIX or ASA 5500 security appliances and upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your organization to design, configure, tune, manage and troubleshoot firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about ASA 5500-X Firewalls with Firepower integration and troubleshooting services.
Cisco Security and Virtual Private Network Engineering Services
Cisco's security and remote access products represent a comprehensive range of easy-to-administer security products to help protect your wired and wireless information system. Cisco's Virtual Private Network product family features switches, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's professional consulting staff includes experienced engineers with Cisco CCIE and CCNP qualifications who are able to help your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that align best with your business objectives. Learn additional details about Progent's Consulting Services for Cisco Security Technology and Virtual Private Network Products.
Support Services for Other Firewall and Virtual Private Network Products
Progent provides small and medium size businesses expert consulting for Intrusion Protection products and IPsec VPN products from major firewall and Virtual Private Network security vendors including Check Point Software, Juniper, and Symantec. Progent can show you how to design a detailed security strategy and choose appropriate products from a variety of suppliers to achieve your security objectives while sticking within your spending limits.
Progent's Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight portfolio of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services offered by Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that utilizes next generation behavior-based analysis technology to guard endpoint devices as well as physical and virtual servers against new malware attacks like ransomware and email phishing, which routinely get by traditional signature-based AV products. ProSight Active Security Monitoring safeguards on-premises and cloud resources and provides a single platform to manage the complete malware attack lifecycle including blocking, identification, containment, remediation, and forensics. Key capabilities include one-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against new threats. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
ProSight Enhanced Security Protection (ESP) managed services deliver economical multi-layer security for physical servers and VMs, desktops, mobile devices, and Exchange Server. ProSight ESP uses adaptive security and advanced machine learning for round-the-clock monitoring and responding to security threats from all attack vectors. ProSight ESP delivers firewall protection, penetration alarms, endpoint management, and web filtering via leading-edge tools incorporated within a single agent managed from a single control. Progent's security and virtualization experts can assist your business to design and configure a ProSight ESP deployment that meets your organization's unique needs and that helps you prove compliance with government and industry information protection standards. Progent will assist you define and configure policies that ProSight ESP will manage, and Progent will monitor your network and respond to alerts that require urgent action. Progent can also help your company to install and verify a backup and disaster recovery solution like ProSight Data Protection Services (DPS) so you can recover rapidly from a destructive security attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Exchange email filtering.
ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services from Progent provide small and medium-sized businesses a low cost and fully managed solution for secure backup/disaster recovery (BDR). For a low monthly cost, ProSight DPS automates and monitors your backup processes and enables fast recovery of critical data, apps and virtual machines that have become unavailable or corrupted as a result of component breakdowns, software bugs, disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware images/. Important data can be protected on the cloud, to a local storage device, or mirrored to both. Progent's cloud backup specialists can provide advanced support to configure ProSight Data Protection Services to to comply with government and industry regulatory requirements such as HIPPA, FINRA, PCI and Safe Harbor and, whenever necessary, can help you to restore your business-critical information. Find out more about ProSight Data Protection Services Managed Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the infrastructure of top information security companies to provide centralized control and comprehensive protection for your inbound and outbound email. The powerful structure of Email Guard integrates a Cloud Protection Layer with an on-premises gateway appliance to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based threats. Email Guard's cloud filter acts as a preliminary barricade and keeps the vast majority of threats from making it to your network firewall. This reduces your vulnerability to inbound threats and conserves network bandwidth and storage. Email Guard's onsite security gateway device provides a further layer of analysis for incoming email. For outgoing email, the on-premises security gateway provides anti-virus and anti-spam protection, protection against data leaks, and email encryption. The on-premises security gateway can also help Exchange Server to monitor and protect internal email traffic that originates and ends inside your corporate firewall. For more information, see ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and apps hosted in a protected Tier III data center on a high-performance virtual host configured and managed by Progent's network support experts. With the ProSight Virtual Hosting model, the customer retains ownership of the data, the operating system software, and the applications. Because the system is virtualized, it can be moved easily to a different hosting solution without requiring a time-consuming and technically risky reinstallation procedure. With ProSight Virtual Hosting, your business is not tied a single hosting service. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, update, find and protect information related to your network infrastructure, processes, applications, and services. You can quickly find passwords or serial numbers and be warned automatically about impending expirations of SSL certificates or domains. By updating and managing your network documentation, you can save as much as 50% of time thrown away searching for critical information about your IT network. ProSight IT Asset Management features a centralized repository for holding and sharing all documents related to managing your network infrastructure like recommended procedures and How-To's. ProSight IT Asset Management also supports advanced automation for gathering and relating IT data. Whether youíre making improvements, doing maintenance, or responding to an emergency, ProSight IT Asset Management gets you the information you require the instant you need it. Find out more about ProSight IT Asset Management service.
Certified Security Planning
Every business ought to develop a thoroughly considered security program that includes both preventive procedures and reaction planning. The pre-attack plan is a collection of mechanisms that help to minimize security weaknesses. The reactive strategy helps your company's IT security engineers to evaluate the impact resulting from a security penetration, repair the damage, record the event, and get business functions running as soon as possible.
Progent's expert information security engineers are available to help your company to run a complete risk assessment and define a company-wide security strategy to establish security policies and controls to mitigate future assaults and threats.
CISM Accredited Security Engineering Expertise
The Certified Information Security Manager (CISM) organization defines the basic capabilities and global standards of performance that IT security professionals are required to learn. CISM gives executive management the confidence that those who have earned their CISM certification have the background and capability to provide efficient security administration and consulting consulting. Progent offers the support of CISM Premier security consultants to assist companies with:
Learn more information concerning Progent's CISM Accredited Security Engineering Expertise.
- Information Security Governance
- Risk Management
- IS Security Program Management
- Network Security Administration
- Response Management
CISSP Accredited Security Engineering Expertise
CISSP recognizes mastery of a worldwide standard for network security. The American National Standards Institute has granted certification recognition in the field of information security stipulated by ISO/IEC 17024. Progent can provide the services of security professionals who have qualified for CISSP accreditation. Progent can provide a CISSP-certified professional to help your company in a variety security fields including:
Read additional information concerning Progent's CISSP-certified Network Security Consulting Professionals.
- Security Management Practices
- Security Architecture and Paradigms
- Access Control Systems and Processes
- Software Development Security
- Operations Security
- Physical Security
- Encryption/Decryption Technology
- Telecom, LAN and WAN Security
- Business Continuity Planning
CISSP-ISSAP Accredited Secure IT Architecture Engineering Services
Progent's CISSP-ISSAP Premier IT architecture professionals are consultants who have earned ISSAP status through thorough examination and extensive work with network security design. The Information System Security Architecture Professional (ISSAP) credential indicates proven mastery in the most in-depth requirements of information system security architecture within the wider field of IS security expertise required for CISSP certification. Progent's ISSAP-certified security experts can assist your business with all phases of architecture security such as.
Read additional details concerning Progent's ISSAP Accredited Secure Network Architecture Engineering Services.
- Access Management Systems and Methodologies
- Phone System and Network Security
- Cryptography Options
- Needs Evaluation and Security Guidelines
- Business Continuity Planning (BCP) and Disaster Recovery Planning
- Physical Security
CISA Certified IS Security Auditing Consulting Services
The Certified Information Systems Auditor accreditation is a recognized qualification that indicates mastery in information system security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA credential has consultants pass a comprehensive test given by the ISACA international professional association. Progent's CISA-qualified network security audit specialists are available to help your business in the areas of:
Read more information concerning Progent's CISA Certified Network Security Auditing Consulting Assistance.
- Information Systems Audit Process
- IT Enforcement
- Network Assets and Architecture Lifecycle Planning
- Information Technology Support
- Protecting Information Assets
- Disaster Recovery Planning
Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC certification program was initiated by ISACA to validate an IT professional's skills to design, deploy, and maintain IS controls to reduce risk. Progent offers the services of a CRISC-certified engineer to help your company to create and carry out a workplace continuity strategy that follows leading practices identified by CRISC and geared to match your company's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC-qualified IT risk management consultants offer a variety of risk evaluation services including:
Find out more information about Progent's CRISC Risk Management Consultants.
- Gather data and review documentation to evaluate major vulnerabilities
- Inventory statutory, regulatory, and contractual requirements and company policies associated with your information system to determine their possible impact on your strategic goals
- Identify possible threats for your business workflows to assist in evaluating your enterprise risk
- Create a risk awareness initiative and provide seminars to make sure your stakeholders understand information system risk so they can assist with your risk control process
- Match identified risk vectors to related business processes to help determine risk ownership
- Validate risk tolerance with your senior management and key stakeholders to make sure they align
GIAC Accredited IS Security Consulting Support
Find out additional details about Progent's GIAC Information Assurance Services.
GIAC was founded in 1999 to certify the knowledge of information technology security experts. GIAC's goal is to assure that an accredited professional possesses the knowledge needed to provide services in vital areas of network, data, and software security. GIAC accreditations are acknowledged by businesses and institutions around the world including and the U.S. National Security Agency. Progent's GIAC-qualified network security audit experts can assist your company in the areas of:
Talk to a Security Specialist
To find out how to get in touch with a certified Progent security consultant for remote or on-premises expertise in New York, call 1-800-993-9400 or visit Online Computer Support.