Small business computer networks inNew Yorkcan have fast and affordable remote help from Progent's qualified security professionals to assist with urgent security issues. Rates are competitive, charges are by the minute, sign-up is immediate, and service is unbeatable. Progent also provides assistance for complex projects that demand the expertise of seasoned security consultants with top industry certifications.
In case yourNew Yorkorganization is based far from larger metropolitan neighborhoods likeNew York City, Buffalo, Rochester, Yonkers, or Syracuse, contact with nearby certified security experts may be limited during an urgent situation. This can result in a loss of income for your business, angry clients, idle employees, and defocused executives. By utilizing Progent's online services, you have access to a Certified security professional ready to provide assistance when you need it to keep your information system operating and restore your data.
Progent can help you in all your initiatives to guard your network with services that can range from network security assessments to developing a comprehensive security strategy. Progent provides economical service to assist businesses of all sizes to design and manage secure IT environments based on Windows and Cisco products and that can include computers based on UNIX, Linux, Sun Solaris, or Mac OS X platforms plus BYOD users with Apple iOS iPhones and iPads or Android or Windows Phone devices.
Progent can also assist you to outsource spam filtering and protection from email-borne attacks. Email Guard is Progent's email security platform that uses the technology of top data security vendors to provide web-based management and comprehensive protection for your email traffic. The hybrid structure of Progent's Email Guard integrates a Cloud Protection Layer with a local security gateway device to provide advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The Cloud Protection Layer acts as a first line of defense and keeps the vast majority of threats from reaching your security perimeter. This decreases your vulnerability to inbound threats and saves network bandwidth and storage. ProSight Email Guard's onsite gateway appliance provides a deeper level of analysis for inbound email. For outgoing email, the local security gateway provides anti-virus and anti-spam protection, protection against data leaks, and email encryption. The on-premises gateway can also help Microsoft Exchange Server to track and protect internal email that originates and ends within your security perimeter.
Progent's security engineers are available remotely or in person to provide a range of urgent or project-based computer security services including:
If your business has an immediate requirement for computer security support, refer to Progent's Urgent Remote Technical Help.
Progent's consultants offer world-class services in key fields of system security that include auditing, firewall and VPN expertise, and advanced security consulting.
Progent's certified security consultants can assess the vulnerability of your current network protection systems through comprehensive remote automated testing based on sophisticated utilities and proven procedures. Progent's experience in administering this service saves you money and assures an accurate portrayal of security holes. The information your business is provided can be used as the basis of a security strategy that will permit your network to run safely and react rapidly to new threats.
Automated Security Assessment
Progent provides expertise in the use of security testing software such as Microsoft Baseline Security Analyzer and LANguard from GFI for economically performing a set of programmed system auditing checks to identify possible security problems. Progent has broad experience with other security auditing utilities such as NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, as well as tools like Metasploit, Netcat, Socat, and Nikto. Progent can show you how to understand testing reports and respond appropriately.
Progent can help you design security into your business operations, install auditing software, plan and implement a secure system architecture, and suggest policies to optimize the security of your network. Progent's security consultants are able to show you how to set up a firewall, implement secure remote connectivity to email and data, and integrate VPN. Learn more about Progent's automated security evaluation.
Security Inventory Scanning Packages for Small Companies
Progent offers two ultra-affordable security inventory and evaluation packages intended to allow small companies to get a professional security assessment from a qualified security consultant. With Progent's External Security Inventory Scan, a security engineer runs a comprehensive examination of your IT infrastructure from outside your company firewall to uncover potential risks in the security posture you present to the public. With Progent's Internal Security Inventory Scan, a security engineer runs a network scan from an authorized machine within your firewall to assess the risk to inside assaults. The two security inventory packages are configured and executed from a secured external site. The process is managed by a consultant with top security accreditations and who generates a report that summarizes and interprets the information captured by the scan and proposes practical remediation if appropriate.
Stealth Security Penetration Analysis Support Services
Stealth intrusion testing is a key component of any comprehensive IT system security plan. Progentís security experts can run extensive penetration tests without the knowledge of your company's in-house IT staff. Unannounced penetration checking uncovers whether current security monitoring systems such as intrusion detection warnings and event log monitoring are properly set up and actively monitored. Find out additional information concerning Progent's network security penetration testing support services.
Firewall And Virtual Private Network (VPN) Expertise
Progent's expertise in security solutions encompasses in-depth familiarity with major firewalls and Virtual Private Network (VPN) technology offered by a variety of vendors such as Cisco, Microsoft, and CheckPoint. Progent offers the support of engineers with key networking certifications such as CCIE and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Configuration and Troubleshooting
The current ASA 5500-X Family of firewalls with Firepower Services offer significantly more performance than Cisco's previous firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new installations. After Cisco's acquisition of Sourcefire, the whole line of Cisco ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort technology, which is the world's most deployed intrusion protection system (IPS). Firepower services bring powerful new features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can assist your company to manage your current PIX or Cisco ASA 5500 security appliances and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your business to design, configure, optimize, manage and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Read additional details about ASA 5500-X Firewalls with Firepower Services integration and debugging services.
Cisco Network Security and VPN Consulting Expertise
Cisco's security and remote access technology offer a complete range of easy-to-administer security products to help protect your local and remote network infrastructure. Cisco's Virtual Private Network product family features switches, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's professional consulting staff includes field-proven specialists with Cisco's CCIE and CCNP certifications who are able to help your business to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that fit best with your business objectives. Learn more information about Progent's Support Expertise for Cisco Security Technology and Virtual Private Network Products.
Consulting Services for Other Firewall and Virtual Private Network Solutions
Progent offers small and mid-size companies professional consulting for Intrusion Protection products and IPsec VPN technology from leading firewall and Virtual Private Network security vendors including WatchGuard, Juniper Networks, and Symantec. Progent can help you create a detailed security plan and select appropriate technologies from multiple vendors to support your security objectives while staying within your budget restraints.
Progent's Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight portfolio of network management outsourcing services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection solution that utilizes cutting edge behavior-based machine learning technology to guard endpoint devices and physical and virtual servers against modern malware attacks such as ransomware and file-less exploits, which easily escape traditional signature-based AV products. ProSight Active Security Monitoring protects local and cloud-based resources and provides a single platform to address the entire malware attack lifecycle including blocking, detection, mitigation, remediation, and forensics. Top capabilities include single-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Endpoint Protection
ProSight Enhanced Security Protection (ESP) managed services offer economical in-depth security for physical servers and virtual machines, desktops, smartphones, and Exchange email. ProSight ESP uses contextual security and advanced machine learning for continuously monitoring and responding to cyber assaults from all attack vectors. ProSight ESP delivers firewall protection, penetration alarms, endpoint control, and web filtering via cutting-edge technologies packaged within one agent managed from a single console. Progent's security and virtualization experts can help you to plan and configure a ProSight ESP environment that meets your organization's unique needs and that allows you achieve and demonstrate compliance with government and industry data protection standards. Progent will help you define and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alerts that require urgent attention. Progent can also assist your company to set up and test a backup and disaster recovery system such as ProSight Data Protection Services (DPS) so you can recover quickly from a potentially disastrous cyber attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Exchange filtering.
ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services offer small and medium-sized organizations a low cost and fully managed service for reliable backup/disaster recovery. Available at a fixed monthly price, ProSight Data Protection Services automates your backup processes and allows fast restoration of vital data, apps and VMs that have become unavailable or damaged as a result of component failures, software bugs, disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, applications, system images, as well as Hyper-V and VMware images/. Important data can be backed up on the cloud, to an on-promises storage device, or to both. Progent's cloud backup specialists can deliver advanced expertise to set up ProSight Data Protection Services to be compliant with government and industry regulatory requirements such as HIPAA, FINRA, and PCI and, when necessary, can assist you to restore your critical information. Read more about ProSight DPS Managed Cloud Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the infrastructure of top information security companies to provide centralized control and world-class protection for your email traffic. The hybrid structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local gateway appliance to provide advanced protection against spam, viruses, Dos Attacks, DHAs, and other email-borne threats. The cloud filter acts as a preliminary barricade and keeps most threats from reaching your network firewall. This decreases your exposure to inbound attacks and conserves network bandwidth and storage space. Email Guard's on-premises gateway appliance adds a further level of inspection for inbound email. For outgoing email, the onsite security gateway offers anti-virus and anti-spam protection, protection against data leaks, and email encryption. The on-premises gateway can also help Microsoft Exchange Server to monitor and protect internal email that originates and ends within your security perimeter. For more information, visit ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small organization can have its key servers and applications hosted in a protected fault tolerant data center on a high-performance virtual machine host configured and managed by Progent's network support professionals. With the ProSight Virtual Hosting service model, the client retains ownership of the data, the OS software, and the apps. Since the system is virtualized, it can be moved immediately to a different hosting solution without requiring a lengthy and difficult reinstallation procedure. With ProSight Virtual Hosting, you are not locked into one hosting service. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, update, retrieve and safeguard information about your IT infrastructure, processes, applications, and services. You can quickly find passwords or IP addresses and be warned automatically about impending expirations of SSLs or warranties. By updating and managing your network documentation, you can save up to 50% of time wasted searching for critical information about your network. ProSight IT Asset Management includes a centralized repository for holding and sharing all documents related to managing your network infrastructure such as recommended procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for gathering and associating IT information. Whether youíre making enhancements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the data you require as soon as you need it. Learn more details about ProSight IT Asset Management service.
Expert Network Security Consulting
Any business should develop a thoroughly considered security program that includes both preventive procedures and reaction planning. The proactive strategy is a collection of mechanisms designed to minimize security weaknesses. The post-attack strategy helps your company's security engineers to evaluate the damage resulting from a security penetration, repair the system, record the event, and get the IT network restored as quickly as feasible.
Progent's expert IT security engineers can to help your company to run a complete vulnerability assessment and define a computer security plan to implement security processes and controls to mitigate ongoing attacks and threats.
CISM Certified Security Consulting Assistance
The Certified Information Security Manager (CISM) organization describes the core competencies and international standards of skill that IT security professionals are required to learn. CISM provides business management the assurance that those who have qualified for their CISM credential possess the experience and knowledge to deliver efficient security management and support services. Progent can provide the support of CISM Certified security professionals to assist businesses with:
Learn additional details concerning Progent's CISM Certified Network Security Support Services.
- Information Security Strategies
- Risk Analysis
- IS Security Program Management
- Information Security Administration
- Response Management
CISSP Certified Security Engineering Expertise
CISSP certification recognizes expertise with a global standard for network security. ANSI (American National Standards Institute) has awarded certification recognition in the field of data security stipulated by ISO/IEC 17024. Progent can provide the services of security experts who have qualified for CISSP certification. Progent can provide a CISSP-certified professional to help your enterprise in a variety security areas including:
Read more information concerning Progent's CISSP Accredited Information Security Consulting Services.
- Security Management Practices
- Security Infrastructure and Paradigms
- Access Management Systems and Processes
- Software Development Security
- Secure Operations
- Physical Security
- Cryptography Technology
- Telecom, LAN and WAN Security
- Disaster Recovery Preparedness
CISSP-ISSAP Certified Secure System Architecture Consulting Support
Progent's CISSP-ISSAP Premier network architecture professionals are consultants who have earned ISSAP status through thorough examination and significant work with information security architecture. The Information System Security Architecture Professional (ISSAP) credential indicates proven competence in the most complex demands of information system security architecture within the wider field of IS security expertise needed for CISSP certification. Progent's ISSAP-certified security specialists can assist your company with all phases of architecture security such as.
Find out more information about Progent's ISSAP Certified Secure IT Architecture Engineering Expertise.
- Access Control Mechanisms and Techniques
- Phone System and Network Protection
- Data Encryption Solutions
- Needs Analysis and Security Guidelines
- Business Continuity Planning and Disaster Recovery Planning
- Hardware Security
CISA Accredited Information System Security Auditing Engineering Support
The Certified Information Systems Auditor accreditation is a prestigious qualification that represents expertise in information system security audit and control. Certified by the American National Standards Institute (ANSI), the CISA accreditation has candidates undergo an extensive examination administered by the ISACA professional association. Progent's CISA-certified information security audit specialists are available to assist your IT organization with:
Learn more details about Progent's CISA Certified IS Security Auditing Consulting Support.
- IS Audit Process
- Information Technology Administration
- Systems and Infrastructure Lifecycle
- Information Technology Support
- Safeguarding Data Resources
- Disaster Recovery Preparedness
The CRISC certification program was established by ISACA in 2010 to verify a consultant's skills to design, deploy, and maintain information system control mechanisms to reduce network risk. Progent can provide the services of a CRISC-certified consultant to assist your company to create and execute a workplace continuity plan that follows leading practices promoted by CRISC and crafted to match your organization's risk tolerance, business objectives, and IT budget. Progent's CRISC-certified IT risk mitigation experts offer a variety of risk identification services such as:
Learn the details concerning Progent's CRISC Risk Management Consultants.
- Collect data and review documentation to identify significant risk scenarios
- Inventory legal, regulatory, and business requirements and company policies associated with your network to assess their possible influence on your business objectives
- Point out potential threats for your business processes to help in analyzing your corporate risk
- Create a risk awareness program and conduct seminars to make sure your stakeholders appreciate information system risk so they can contribute to your risk management process
- Match key risk vectors to your associated operational processes to help assign risk responsibility
- Determine risk tolerance with your senior management and key stakeholders to ensure they are in agreement
GIAC Accredited Information System Security Consulting Expertise
Learn more details about Progent's GIAC Information Assurance Support.
GIAC was established in 1999 to validate the skill of computer security engineers. GIAC's mission is to ensure that an accredited professional has the knowledge appropriate to provide support in vital categories of system, data, and application security. GIAC accreditations are recognized by companies and institutions around the world including and the United States National Security Agency (NSA). Progent's GIAC IS security audit specialists can help your business with:
Get in Touch with a Certified Security Specialist
To find out how to access a certified Progent security consultant for remote or on-premises expertise in New York, call 1-800-993-9400 or go to Online Network Help.