Small business computer networks in New York can have quick and affordable online access to Progent's certified network security professionals to help with the toughest security issues. Rates are competitive, charges are by the minute, engagement is immediate, and service is unbeatable. Progent also provides assistance for long-term projects that demand the knowledge of seasoned security engineers with high-level security credentials.
If your New York organization is situated some distance from larger urban neighborhoods including New York City, Buffalo, Rochester, Yonkers, or Syracuse, support from local accredited security experts is often problematic when you have an urgent situation. This can cause lost revenue for your business, upset customers, unproductive workers, and distracted management. By calling Progent, you can get in touch with a Premier security engineer who can deliver expertise when you have to have it to keep your network operating and salvage your data.
Progent can assist you in a variety of ways in your efforts to protect your information system with support services ranging from network security assessments to creating a company-wide security plan. Progent offers economical service to help businesses of all sizes to set up and manage safe networks powered by Windows and Cisco technology and that may include servers and desktops running UNIX, Linux, Solaris, or Apple Mac OS X platforms as well as BYOD users with Apple handhelds or Android or Windows Phone devices.
Ransomware Hot Line: 800-462-8800
Progent's Ransomware Hot Line is designed to guide organizations to take the time-critical first steps in mitigating a ransomware attack by putting out the fire. Progent's online ransomware engineers can assist businesses to identify and quarantine infected devices and protect undamaged resources from being compromised.
If your network has been penetrated by any version of ransomware, don't panic. Get help quickly by calling Progent's 24x7 Ransomware Hot Line at 800-462-8800.
Overview of Progent's Security Expertise
Progent can assist you to outsource spam filtering and protection from email-borne attacks. Email Guard is Progent's email security solution that incorporates the services and infrastructure of leading data security companies to deliver centralized management and comprehensive security for your email traffic. The hybrid structure of Email Guard managed service integrates a Cloud Protection Layer with a local gateway device to offer advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The Cloud Protection Layer serves as a preliminary barricade and keeps the vast majority of threats from making it to your network firewall. This decreases your vulnerability to external threats and conserves system bandwidth and storage space. ProSight Email Guard's on-premises gateway appliance provides a further layer of analysis for inbound email. For outbound email, the local security gateway provides AV and anti-spam filtering, DLP, and encryption. The on-premises gateway can also enable Exchange Server to track and protect internal email that stays within your security perimeter.
Progent's security engineers are available remotely or in person to provide a range of urgent or longer-term computer security services including:
Progent's security experts provide world-class support in vital areas of system protection including security evaluation, firewalls and VPN, and advanced security consulting.
System Evaluation
Progent's expert security consultants can evaluate the vulnerability of your existing computer protection systems through comprehensive remote automated analysis via advanced software tools and tested techniques. Progent's experience in administering this testing saves you money and assures an accurate picture of system vulnerability. The information your business gains can form the foundation of a security strategy that will allow your information system to run dependably and adapt quickly to new risks.
Automated Security Audits
Progent provides consulting in the use of security testing products such as Microsoft's MBSA and GFI LANguard for affordably performing a set of automatic network auditing checks to uncover possible security holes. Progent has extensive experience with other network analysis tools including NMAP Port Scanner, AMAP Application Scanner, eEye, as well as tools such as Metasploit, Netcat, and Nikto. Progent can help you to understand testing reports and react effectively.
Progent can show you how to build security into your business processes, install scanning tools, define and deploy a secure system environment, and suggest procedures to maximize the safety of your network. Progent's security professionals are able to assist you to configure a firewall, implement secure remote access to email and business applications, and install virtual private network. Find out additional information on Progent's network security evaluation.
Security Inventory Packages for Small Companies
Progent offers two ultra-affordable security inventory and evaluation packages intended to allow small companies to get an independent network security evaluation from a qualified security expert. With Progent's External Security Inventory Checkup, a security engineer administers a comprehensive examination of your network from beyond your firewalled perimeter to uncover possible risks in the security profile you present to the public. With Progent's Internal Network Security Inventory Scan, a security engineer runs a system scan from an authorized computer inside your firewall to uncover your exposure to internal attacks. Both security inventory services are set up and run from a protected external site. The project is directed by a consultant who has earned high-level security accreditations and who generates a report that details and analyzes the data captured by the scan and proposes cost-effective remediation if appropriate.
Consulting Services for Horizon3.ai's NodeZero Security Assessment Products
NodeZero from Horizon3.ai is a cutting-edge penetration test (pentest) product family that supports continuous, simultaneous, programmable assessment of your internal and perimeter network so you can uncover, rank, fix, and verify cybersecurity weaknesses before threat actors can exploit them. Progent's pentest experts can help you to deploy NodeZero to carry out comprehensive pentests of your perimeter and your internal network in order to determine your current security profile. Progent can also help you to strengthen your existing network security and can assist you to plan and deploy a unified cybersecurity strategy that streamlines management and provides optimum cyber defense for on-premises, cloud-based, and perimeter IT resources. To find out additional information about Progent's threat assessment solutions powered by on NodeZero's pentest platform, refer to Consulting Support for NodeZero's PEN Test Products.
Network Security Penetration Analysis Consulting
Stealth penetration checking is an important component of any comprehensive IT system security strategy. Progent's security professionals can perform extensive intrusion tests without the knowledge of your organization's in-house IT resources. Unannounced penetration testing shows whether existing security defense systems such as intrusion incident alerts and event history analysis are properly set up and consistently monitored. Find out additional information concerning Progent's network penetration testing support services.
Firewalls and VPN Support
Progent's background in security solutions includes in-depth field work with major firewalls and VPN technology from multiple companies including Cisco, Microsoft, CheckPoint and Fortinet. Progent can provide the support of engineers with key industry certifications such as CCIE and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Debugging
The current ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide substantially more performance than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new deployments. Since Cisco's purchase of Sourcefire, the whole family of ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed intrusion protection system. Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can assist your company to maintain your current PIX or ASA 5500 security appliances or upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite support for ASA 5500-X firewalls with Firepower Services and can help your company to plan, deploy, tune, administer and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. See more information about Cisco ASA 5500-X Firewalls with Firepower Services integration and troubleshooting services.
Cisco Security and Virtual Private Network Engineering Expertise
Cisco's security and remote connection products provide a complete line of easy-to-administer security solutions to help safeguard your local and remote network infrastructure. Cisco's VPN product family features switches, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's professional consulting staff includes experienced engineers with Cisco Certified Internetwork Expert and Cisco Certified Network Professional qualifications who are able to assist your company to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that fit most closely with your business goals. Read additional information about Progent's Support Services for Cisco Security Solutions and VPN Products.
Consulting Expertise for Additional Firewall and Virtual Private Network Products
Progent provides small and mid-size businesses professional consulting for Intrusion Protection Systems and IPsec VPN technology from major firewall and VPN security vendors including WatchGuard, Juniper Networks, and SonicWall. Progent can help you design a detailed security strategy and select appropriate technologies from a variety of suppliers to support your security goals while sticking within your budget limits.
Progent's Flat-rate Managed Services for Information Assurance
Progent's affordable ProSight line of managed services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. Managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection service that incorporates SentinelOne's next generation behavior analysis technology to defend endpoint devices and servers and VMs against new malware attacks such as ransomware and email phishing, which easily get by legacy signature-matching anti-virus products. ProSight ASM protects local and cloud resources and provides a single platform to automate the complete threat progression including blocking, detection, containment, remediation, and post-attack forensics. Key capabilities include one-click rollback using Windows Volume Shadow Copy Service and real-time system-wide immunization against new threats. Progent is a SentinelOne Partner, reseller, and integrator. Read more about Progent's
ProSight Enhanced Security Protection: Unified Endpoint Security
ProSight Enhanced Security Protection managed services deliver affordable multi-layer security for physical servers and VMs, desktops, mobile devices, and Exchange Server. ProSight ESP utilizes contextual security and advanced heuristics for round-the-clock monitoring and reacting to cyber assaults from all attack vectors. ProSight ESP delivers two-way firewall protection, penetration alarms, device management, and web filtering through cutting-edge technologies incorporated within one agent managed from a unified control. Progent's data protection and virtualization experts can help you to plan and implement a ProSight ESP environment that addresses your company's specific requirements and that helps you prove compliance with legal and industry information protection regulations. Progent will help you define and configure security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alerts that call for urgent action. Progent can also assist your company to install and test a backup and restore solution such as ProSight Data Protection Services (DPS) so you can recover rapidly from a destructive cyber attack such as ransomware. Learn more about Progent's
ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services provide small and medium-sized businesses an affordable end-to-end solution for secure backup/disaster recovery (BDR). Available at a fixed monthly rate, ProSight Data Protection Services automates and monitors your backup activities and allows rapid restoration of critical data, apps and VMs that have become lost or corrupted as a result of component breakdowns, software glitches, disasters, human mistakes, or malicious attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware images/. Critical data can be backed up on the cloud, to an on-premises storage device, or to both. Progent's cloud backup specialists can provide advanced support to configure ProSight Data Protection Services to to comply with regulatory requirements such as HIPAA, FIRPA, and PCI and, when necessary, can help you to restore your business-critical information. Read more about ProSight Data Protection Services Managed Cloud Backup and Recovery.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the technology of leading data security companies to provide centralized management and comprehensive security for all your email traffic. The powerful structure of Progent's Email Guard managed service combines cloud-based filtering with a local gateway device to offer advanced defense against spam, viruses, Dos Attacks, DHAs, and other email-borne malware. Email Guard's cloud filter serves as a first line of defense and keeps most threats from making it to your security perimeter. This decreases your exposure to inbound attacks and conserves network bandwidth and storage space. Email Guard's onsite security gateway device provides a further level of inspection for incoming email. For outgoing email, the on-premises gateway provides anti-virus and anti-spam filtering, DLP, and email encryption. The local security gateway can also help Exchange Server to monitor and safeguard internal email traffic that originates and ends inside your security perimeter. For more information, see Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and applications hosted in a secure Tier III data center on a fast virtual host set up and maintained by Progent's network support professionals. With Progent's ProSight Virtual Hosting model, the client retains ownership of the data, the operating system software, and the apps. Since the environment is virtualized, it can be ported immediately to a different hosting environment without requiring a time-consuming and difficult configuration process. With ProSight Virtual Hosting, you are not locked into one hosting provider. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, update, retrieve and protect information related to your IT infrastructure, processes, applications, and services. You can instantly locate passwords or serial numbers and be alerted about impending expirations of SSL certificates or domains. By cleaning up and managing your network documentation, you can eliminate as much as 50% of time wasted looking for critical information about your IT network. ProSight IT Asset Management features a common location for storing and sharing all documents related to managing your network infrastructure such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers advanced automation for gathering and associating IT data. Whether you're planning enhancements, doing regular maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the data you need the instant you need it. Find out more about Progent's ProSight IT Asset Management service.
Certified Network Security Planning
Any business should have a thoroughly thought out security program that includes both preventive procedures and response planning. The proactive strategy is a set of procedures that help to reduce vulnerabilities. The post-attack plan helps your security engineers to assess the damage caused by a security penetration, fix the damage, document the event, and get the IT network restored as rapidly as possible.
Progent's certified IT security engineers are available to help your company to run a complete vulnerability assessment and create a computer security strategy to implement security policies and mechanisms to reduce future assaults and dangers.
CISM Certified Information Security Consulting Expertise
The Certified Information Security Manager (CISM) committee defines the basic capabilities and international standards of skill that information security professionals are required to learn. CISM gives business management the confidence that those who have qualified for their CISM credential possess the experience and knowledge to deliver effective security administration and consulting consulting. Progent offers the support of CISM Certified security professionals to help businesses with:
CISSP Accredited Security Consulting Expertise
CISSP certification denotes expertise with a worldwide standard for data security. The American National Standards Institute has granted the CISSP credential accreditation in the area of information security under ISO/IEC 17024. Progent can provide access to of security experts who have earned CISSP accreditation. Progent can provide a CISSP-certified consultant to help your company in a broad range of security fields such as:
CISSP-ISSAP Qualified Secure IT Architecture Engineering Support
Progent's CISSP-ISSAP Certified IT architecture engineers are experts who have been awarded ISSAP status as a result of thorough testing and extensive work with network security architecture. The ISSAP credential represents demonstrated skill in the more complex requirements of information security architecture within the broader scope of information security expertise needed for CISSP certification. Progent's ISSAP-certified security consultants can help your company with all aspects of secure network architecture including.
CISA Qualified Network Security Auditing Consulting Services
The Certified Information Systems Auditor credential is a globally recognized qualification that represents mastery in network security auditing. Certified by the American National Standards Institute (ANSI), the CISA accreditation has candidates pass a comprehensive test administered by the ISACA professional association. Progent's CISA-qualified information security audit experts can assist your IT organization in the areas of:
CRISC Consultants
The CRISC certification program was initiated by ISACA in 2010 to validate an IT professional's skills to design, implement, and maintain information system controls to reduce network risk. Progent can provide the expertise of a CRISC-certified consultant to assist you to create and execute a workplace continuity or disaster recovery strategy that follows industry best practices promoted by CRISC and crafted to match your organization's risk appetite, business objectives, and IT budget. Progent's CRISC IT risk mitigation experts can provide a variety of risk assessment services including:
GIAC Qualified IS Security Engineering Assistance
GIAC was established in 1999 to validate the knowledge of information technology security engineers. GIAC's mission is to ensure that an accredited professional has the knowledge necessary to deliver support in critical areas of system, data, and application security. GIAC certifications are acknowledged by businesses and government organizations all over the world including and the United States National Security Agency (NSA). Progent's GIAC-certified network security audit specialists are available to assist your company in the areas of:
Talk to a Certified Progent Security Specialist
To find out how you can get in touch with a certified security consultant for online or onsite assistance in New York, phone