Company IT networks in the state of New York now have quick and economical online access to Progent's qualified network security experts to fix the toughest security problems. The cost is competitive, charges are per minute, engagement is quick, and service is world class. Progent also offers help for long-term engagements that requires the services of seasoned security consultants with top security certifications.

If your New York network is far from more populated urban neighborhoods like New York City, Buffalo, Rochester, Yonkers, or Syracuse, help from nearby accredited security experts could be problematic during an emergency. This can cause lost productivity for your company, upset clients, idle employees, and defocused management. By utilizing Progent's remote support, you can get in touch with a Premier security professional who can offer expertise whenever you have to have it to keep your computer network running and recover your data.

Progent can assist you in your efforts to protect your IT environment with support ranging from security assessments to developing a company-wide security strategy. Progent offers affordable service to help companies of any size to design and maintain secure networks powered by Microsoft Windows and Cisco products and that may include servers and desktops running UNIX, Linux, Solaris, or Apple Mac OS X platforms plus BYOD users with Apple iPhones and iPads or Google Android or Windows Phone devices.

Progent can also show you how to outsource spam blocking and protection from email-borne security threats. Email Guard is Progent's email filtering and encryption platform that uses the technology of top information security companies to provide web-based control and world-class security for your email traffic. The hybrid architecture of Email Guard integrates a Cloud Protection Layer with a local gateway device to offer complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The cloud filter serves as a first line of defense and blocks most unwanted email from reaching your network firewall. This reduces your vulnerability to inbound threats and conserves system bandwidth and storage. ProSight Email Guard's on-premises gateway appliance provides a deeper level of inspection for inbound email. For outgoing email, the onsite security gateway provides AV and anti-spam filtering, protection against data leaks, and encryption. The on-premises security gateway can also help Microsoft Exchange Server to monitor and safeguard internal email traffic that stays inside your corporate firewall.

Progent's certified engineers are accessible online or in person to offer a variety of emergency or longer-term IT security services which include:

If your business has an immediate requirement for computer security help, refer to Progent's Emergency Online Network Support.

Progent's consultants offer world-class support in vital fields of network security including auditing, firewall and VPN expertise, and advanced security consulting.

System Assessment
Progent's certified security engineers can evaluate the effectiveness of your current computer security systems by performing exhaustive remote automated analysis via sophisticated software tools and proven procedures. Progent's skill in this testing saves your company money and assures an objective picture of security holes. The knowledge your IT organization gains can be used as the foundation of a network protection strategy that can allow your information system to operate safely and respond rapidly to future risks.

Automated Vulnerability Evaluation
Progent offers expertise in the application of security testing packages such as Microsoft Baseline Security Analyzer and LANguard from GFI for affordably running a variety of programmed network testing scans to identify possible security vulnerabilities. Progent has extensive experience with additional network analysis products including NMAP Port Scanner, AMAP application mapper, eEye, plus tools such as Metasploit, Netcat, Hydra, and Nikto. Progent can show you how to make sense of testing reports and respond appropriately.

Progent can help you design security into your company operations, install scanning applications, define and implement a protected network architecture, and recommend procedures to maximize the safety of your IT system. Progent's security professionals are ready to help you configure a firewall, design safe remote connectivity to email and business applications, and integrate virtual private network. Find out more about Progent's network security evaluation.

Security Inventory Scanning Bundles for Small Companies
Progent offers two low-cost security inventory scanning packages designed to allow small companies to get an impartial security assessment from a certified security specialist. With Progent's External Security Inventory Scan, a security expert administers a comprehensive examination of your network from beyond your company firewall to determine possible risks in the security profile you present to the public. With Progent's Internal Security Inventory Scan, a certified security professional executes a network scan from an authorized computer inside your company firewall to evaluate your exposure to internal attacks. The two security inventory packages are set up and run from a secured remote location. The project is overseen by an engineer with top security credentials and who produces a document that details and interprets the data captured by the scan and proposes practical remediation if appropriate.

Stealth Penetration Testing Support Services
Stealth intrusion testing is a key part of any successful network security plan. Progentís security experts can run extensive intrusion tests without the knowledge of your organization's internal network support resources. Stealth penetration checking uncovers whether current security defense systems such as intrusion incident warnings and event log monitoring are correctly configured and actively checked. Find out more on Progent's stealth penetration testing consulting.

Firewall/VPN Expertise
Progent's expertise in security technology includes extensive familiarity with leading firewalls and VPN products from multiple vendors including Cisco, Microsoft, and Juniper. Progent offers the support of engineers who have earned important networking certifications including CCIE and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Integration and Troubleshooting
The current ASA 5500-X Series of firewalls with Firepower Services offer substantially more bang for the buck than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new deployments. Following Cisco's purchase of Sourcefire, the whole line of Cisco ASA 5500-X firewalls can be provisioned to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most deployed intrusion protection system (IPS). Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-premier CCIE network experts can assist your company to maintain your current PIX or Cisco ASA 5500 security appliances and migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can help you to design, integrate, optimize, manage and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. See additional details about ASA Firewalls with Firepower configuration and debugging support.

Cisco Security and VPN Support Expertise
Cisco's network security and offsite connection products offer a complete line of easy-to-administer security solutions to help protect your wired and wireless information system. Cisco's VPN product family includes routers, firewalls, intrusion detection devices and VPN concentrators. Progent's expert consulting staff includes field-proven engineers with Cisco CCIE and Cisco Certified Network Professional certifications who are able to assist your organization to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that align most closely with your company goals. Learn additional information concerning Progent's Engineering Services for Cisco Security and VPN Appliances.

Consulting Services for Other Firewall and Virtual Private Network Technology
Progent provides small and mid-size businesses professional consulting for Intrusion Protection Systems and IPsec VPN solutions from major firewall and VPN security vendors such as WatchGuard, Juniper Networks, and Symantec. Progent can help you design a detailed security plan and choose appropriate products from multiple vendors to support your security objectives while staying within your spending limits.

Progent's Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight family of managed services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance. ProSight managed services available from Progent include:

ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes cutting edge behavior machine learning technology to guard endpoints and physical and virtual servers against modern malware attacks such as ransomware and file-less exploits, which easily get by legacy signature-based anti-virus tools. ProSight ASM safeguards on-premises and cloud-based resources and provides a unified platform to address the complete malware attack lifecycle including blocking, detection, containment, cleanup, and forensics. Key capabilities include one-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection managed services offer economical in-depth security for physical and virtual servers, workstations, mobile devices, and Microsoft Exchange. ProSight ESP utilizes adaptive security and modern behavior analysis for round-the-clock monitoring and reacting to cyber assaults from all attack vectors. ProSight ESP provides firewall protection, penetration alarms, endpoint control, and web filtering via leading-edge technologies incorporated within a single agent managed from a unified control. Progent's data protection and virtualization experts can assist you to plan and configure a ProSight ESP environment that meets your organization's specific needs and that allows you prove compliance with government and industry data protection standards. Progent will assist you define and configure security policies that ProSight ESP will manage, and Progent will monitor your network and react to alerts that require immediate action. Progent can also assist you to set up and test a backup and disaster recovery solution like ProSight Data Protection Services (DPS) so you can get back in business quickly from a destructive cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Exchange email filtering.

ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services offer small and medium-sized businesses a low cost and fully managed service for reliable backup/disaster recovery. Available at a low monthly rate, ProSight DPS automates your backup activities and allows fast recovery of critical files, applications and virtual machines that have become unavailable or damaged due to component breakdowns, software bugs, natural disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images, as well as Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to an on-promises device, or to both. Progent's backup and recovery consultants can deliver world-class support to configure ProSight DPS to be compliant with regulatory standards like HIPPA, FINRA, and PCI and, when needed, can help you to recover your business-critical data. Find out more about ProSight Data Protection Services Managed Cloud Backup and Recovery.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the infrastructure of top data security vendors to deliver web-based management and world-class security for all your email traffic. The hybrid architecture of Progent's Email Guard managed service combines a Cloud Protection Layer with an on-premises gateway appliance to offer advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. Email Guard's cloud filter serves as a first line of defense and blocks the vast majority of unwanted email from reaching your security perimeter. This reduces your exposure to inbound threats and conserves system bandwidth and storage space. Email Guard's onsite gateway device adds a deeper layer of analysis for incoming email. For outbound email, the onsite gateway offers anti-virus and anti-spam protection, DLP, and email encryption. The on-premises gateway can also assist Exchange Server to monitor and safeguard internal email traffic that originates and ends inside your security perimeter. For more information, see Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small organization can have its critical servers and applications hosted in a secure Tier III data center on a fast virtual machine host set up and managed by Progent's IT support professionals. Under the ProSight Virtual Hosting model, the customer retains ownership of the data, the OS platforms, and the applications. Since the system is virtualized, it can be ported easily to an alternate hardware environment without requiring a time-consuming and technically risky configuration process. With ProSight Virtual Hosting, you are not locked into a single hosting service. Find out more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, update, find and safeguard information about your IT infrastructure, processes, applications, and services. You can instantly find passwords or IP addresses and be alerted about impending expirations of SSL certificates or warranties. By cleaning up and organizing your IT infrastructure documentation, you can eliminate as much as half of time spent looking for critical information about your IT network. ProSight IT Asset Management features a common location for storing and sharing all documents related to managing your network infrastructure like recommended procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and associating IT data. Whether youíre planning improvements, performing regular maintenance, or responding to a crisis, ProSight IT Asset Management delivers the information you need the instant you need it. Find out more about Progent's ProSight IT Asset Management service.

Certified Network Security Planning
Any company should develop a carefully considered security strategy that includes both proactive procedures and reaction planning. The pre-attack strategy is a set of mechanisms that help to reduce security weaknesses. The reactive strategy assists your IT security personnel to evaluate the damage caused by a security penetration, fix the system, document the experience, and get the IT network running as soon as possible.

Progent's expert IS security consultants are available to assist your business to run a complete vulnerability assessment and define a company-wide security strategy to establish security processes and controls to mitigate ongoing assaults and dangers.

CISM Certified System Security Engineering Services
The CISM organization defines the core capabilities and worldwide standards of skill that IT security professionals are expected to master. CISM gives executive management the confidence that consultants who have qualified for their CISM certification possess the background and capability to deliver efficient security administration and consulting services. Progent offers the support of CISM Certified security professionals to help companies with:

  • IS Security Governance
  • Risk Management
  • IS Security Implementation Management
  • IS Security Management
  • Recovery Management
Find out more details concerning Progent's CISM Accredited Information Security Support Services.

CISSP Certified Security Consulting Expertise
CISSP certification recognizes expertise with a worldwide standard for information security. ANSI (American National Standards Institute) has granted certification accreditation in the field of information protection under ISO/IEC 17024. Progent offers access to of security professionals who have qualified for CISSP certification. Progent can provide a CISSP-certified consultant to help your business in a broad range of security areas including:

  • Security Management Practices
  • Security Architecture and Paradigms
  • Access Control Solutions and Processes
  • Applications Development Security
  • Operations Security
  • Site Security
  • Cryptography Technology
  • Telecommunications, Network and Internet Security
  • Business Continuity Planning
Read more details concerning Progent's CISSP Qualified Network Security Consulting Expertise.

CISSP-ISSAP Qualified Secure Network Architecture Engineering Expertise
Progent's CISSP-ISSAP Premier IT architecture engineers are consultants who have been awarded ISSAP status as a result of rigorous testing and extensive experience with information security design. The ISSAP credential indicates demonstrated mastery in the most in-depth demands of information system security architecture bounded by the broader field of IS security knowledge needed for CISSP accreditation. Progent's ISSAP-premier security experts can help your company with all phases of architecture security such as.

  • Access Management Systems and Methodologies
  • Telecommunications and Network Infrastructure Security
  • Encryption/Decryption Solutions
  • Requirements Evaluation and Security Guidelines
  • BCP and DRP
  • Site Security
Learn additional information about Progent's ISSAP Certified Secure Network Architecture Support Professionals.

CISA Qualified Network Security Auditing Engineering Expertise
The Certified Information Systems Auditor accreditation is an important qualification that signifies expertise in network security auditing. Accredited by ANSI, the CISA accreditation has candidates undergo a comprehensive examination given by the ISACA international professional association. Progent's CISA network security audit consultants are available to help your business in the areas of:

  • Information Systems Audit Services
  • IT Enforcement
  • Systems and Architecture Lifecycle Planning
  • IT Service Delivery
  • Protecting Data Assets
  • Business Continuity Preparedness
Find out the details concerning Progent's CISA Qualified Information System Security Auditing Consulting Expertise.

CRISC Consultants
The CRISC program was initiated by ISACA to verify an IT professional's skills to plan, implement, and maintain information system controls to reduce network risk. Progent offers the services of a CRISC-certified consultant to assist your company to develop and execute a business continuity plan that follows leading practices promoted by CRISC and geared to match your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC-qualified IT risk mitigation consultants offer a variety of risk identification services including:

  • Gather data and review documentation to identify major vulnerabilities
  • Inventory statutory, industry, and business requirements and organizational standards related to your information system to assess their possible impact on your strategic objectives
  • Point out potential vulnerabilities for your business processes to help in evaluating your corporate risk
  • Create a risk awareness initiative and conduct training to ensure your stakeholders appreciate IT risk so they can contribute to your risk management process
  • Match identified risk scenarios to related business procedures to help assign risk ownership
  • Validate risk appetite with your senior leadership and major stakeholders to make sure they align
Learn additional information about Progent's CRISC Risk Management Consultants.

GIAC Accredited Security Engineering Services
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the knowledge of information technology security engineers. GIAC's mission is to ensure that an accredited professional possesses the knowledge appropriate to deliver support in critical categories of system, data, and application software security. GIAC accreditations are acknowledged by businesses and government organizations all over the world including and the U.S. National Security Agency (NSA). Progent's GIAC-certified security audit engineers can assist your business with:

  • Assessing Security Systems
  • Security Incident Handling
  • Intrusion Detection
  • Web Services Security
  • SIEM solutions
Learn more details about Progent's GIAC Information Assurance Expertise.

Contact a Progent Security Engineer
To find out how you can get in touch with a Progent security engineer for remote or on-premises help in New York, call 1-800-993-9400 or visit Online Network Support.