Business information networks in the state ofNew Yorkcan depend on quick and economical online technical support from Progent's qualified network security professionals to help with critical security issues. The cost is competitive, billing is per minute, sign-up is quick, and support is world class. Progent also provides assistance for complex projects that requires the expertise of senior security consultants with high-level industry certifications.
If yourNew Yorkorganization is located some distance from larger metropolitan neighborhoods likeNew York City, Buffalo, Rochester, Yonkers, or Syracuse, help from local accredited security support specialists could be problematic during an emergency. This can cause a loss of productivity for your business, upset clients, unproductive employees, and distracted executives. By utilizing Progent, you have access to a Certified security engineer who can offer assistance whenever you need it to get your network running and restore your data.
Progent can help you in your initiatives to defend your IT environment with support that can range from security checks to developing a company-wide security plan. Progent offers affordable service to assist small and midsize companies to configure and manage protected networks based on Microsoft Windows and Cisco products and that may include servers and desktops running UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as mobile clients with Apple handhelds or Android or Windows Phone handsets.
Progent can also help you outsource spam filtering and protection from email-borne assaults. Email Guard is Progent's email security solution that uses the technology of leading information security companies to deliver centralized management and comprehensive security for your inbound and outbound email. The hybrid structure of Email Guard integrates cloud-based filtering with a local gateway appliance to provide complete defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-based threats. ProSight Email Guard's Cloud Protection Layer serves as a preliminary barricade and blocks most unwanted email from reaching your network firewall. This reduces your vulnerability to inbound attacks and conserves network bandwidth and storage space. ProSight Email Guard's onsite security gateway device provides a further level of analysis for inbound email. For outbound email, the onsite gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also help Exchange Server to track and safeguard internal email traffic that originates and ends within your security perimeter.
Progent's security experts are available remotely or on premises to provide a variety of emergency or longer-term computer security services which include:
If your network has an urgent requirement for IT security help, refer to Progent's Urgent Remote Network Support.
- Run automated security audits
- Recover quickly after virus and worm attacks
- Install firewalls from multiple vendors
- Configure safe techniques for offsite and mobile connectivity
- Deploy advanced solutions for defense against spam and DHAs
- Develop a comprehensive security strategy with 24x7 security monitoring
- Provide outsourced Help Desk Services
- Help Develop an effective network backup and recovery strategy centered on Microsoft DPM backup/restore capability
Progent's security experts offer advanced support in vital facets of network security including analysis, firewall and VPN expertise, and high-level security consulting.
Progent's certified security consultants can assess the vulnerability of your current network security implementation by performing comprehensive remote automated analysis based on sophisticated software tools and tested procedures. Progent's skill in this testing saves your company time and money and assures an objective portrayal of security holes. The information your IT organization gains can form the basis of a network protection strategy that will permit your information system to run dependably and adapt quickly to future risks.
Automated Network Security Evaluation
Progent offers consulting in the application of security analysis software such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard Network Security Scanner for economically running a set of programmed network testing checks to identify potential security problems. Progent has broad knowledge of other network analysis utilities such as NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, plus utilities such as Metasploit, Hydra, and Nikto. Progent can help you to make sense of audit reports and react effectively.
Progent can help you build security into your business operations, install auditing tools, plan and deploy a secure system environment, and recommend policies to optimize the safety of your network. Progent's security engineers are ready to help you configure a firewall, design safe remote access to email and data, and install virtual private network. Learn more about Progent's network security analysis.
Security Inventory and Evaluation Packages for Small Companies
Progent has put together two ultra-affordable security inventory scanning bundles designed to allow small businesses to get an impartial network security assessment from a certified security specialist. With Progent's External Network Security Inventory Scan, a security engineer runs an extensive examination of your network from outside your company firewall to uncover possible weaknesses in the security posture you expose to the outside world. With Progent's Internal Security Inventory Scan, a security expert runs a system scan from a secure machine inside your firewall to uncover your exposure to inside attacks. Both security inventory packages are configured and executed from a protected remote location. The project is overseen by a consultant with high-level security accreditations and who generates a report that details and analyzes the information collected by the scan and proposes practical improvements where appropriate.
Stealth Intrusion Testing Support Services
Stealth penetration testing is a key component of any serious network security plan. Progentís security professionals can run extensive intrusion tests without the knowledge of your company's internal IT resources. Unannounced penetration testing shows whether existing security monitoring systems such as intrusion detection warnings and event history analysis are properly set up and consistently checked. Learn additional information about Progent's network security penetration testing consulting.
Progent's background in network security technology includes in-depth familiarity with major firewalls and Virtual Private Network (VPN) technology offered by multiple companies including Cisco, Microsoft, and Symantec. Progent offers the services of consultants who have earned important networking accreditations including Cisco Certified Internetwork Expert and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Integration and Troubleshooting
The new ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer significantly more performance than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX 500 firewalls for new installations. After Cisco's purchase of Sourcefire, the whole family of ASA 5500-X firewalls can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most popular intrusion protection system (IPS). Firepower services bring enhanced features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist you to maintain your legacy PIX or ASA 5500 security appliances and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help you to plan, configure, tune, manage and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Read more information about Cisco ASA 5500-X Firewalls with Firepower Services integration and debugging services.
Cisco Network Security and VPN Engineering Expertise
Cisco's network security and offsite connection products provide a comprehensive range of easy-to-administer security solutions to help safeguard your wired and wireless information system. Cisco's VPN product family includes switches, firewalls, intrusion detection devices and VPN appliances. Progent's professional staff of consultants includes experienced engineers with Cisco Certified Internetwork Expert and CCNP qualifications who can assist your company to select Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that fit best with your business objectives. Learn more details concerning Progent's Support Services for Cisco Security and VPN Appliances.
Engineering Expertise for Other Firewall and VPN Products
Progent provides small and medium size businesses expert support for Intrusion Protection Systems and IPsec VPN technology from major firewall and VPN security companies such as Check Point Software, Juniper, and SonicWall. Progent can show you how to design a comprehensive security strategy and choose the right technologies from multiple vendors to achieve your security goals while staying within your spending limits.
Progent's Low-Cost Managed Services for Information Security
Progent's affordable ProSight series of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection solution that utilizes cutting edge behavior-based analysis technology to defend endpoints as well as physical and virtual servers against modern malware assaults such as ransomware and file-less exploits, which easily evade legacy signature-based AV products. ProSight ASM safeguards local and cloud-based resources and provides a unified platform to address the entire threat progression including protection, identification, mitigation, remediation, and post-attack forensics. Key features include one-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against newly discovered attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) managed services offer ultra-affordable in-depth protection for physical and virtual servers, desktops, smartphones, and Exchange Server. ProSight ESP utilizes contextual security and modern behavior analysis for round-the-clock monitoring and responding to cyber threats from all attack vectors. ProSight ESP provides firewall protection, intrusion alarms, device control, and web filtering through leading-edge tools incorporated within a single agent managed from a single control. Progent's security and virtualization experts can assist you to plan and implement a ProSight ESP deployment that meets your organization's unique needs and that helps you demonstrate compliance with government and industry information protection regulations. Progent will help you define and implement policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alarms that call for immediate attention. Progent's consultants can also assist your company to install and verify a backup and restore solution such as ProSight Data Protection Services so you can get back in business rapidly from a potentially disastrous cyber attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Exchange filtering.
ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent provide small and medium-sized organizations an affordable end-to-end service for secure backup/disaster recovery (BDR). Available at a low monthly cost, ProSight Data Protection Services automates and monitors your backup activities and allows rapid restoration of critical files, applications and virtual machines that have become lost or corrupted due to hardware failures, software bugs, natural disasters, human error, or malicious attacks such as ransomware. ProSight DPS can help you protect, recover and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to an on-promises storage device, or to both. Progent's backup and recovery specialists can provide advanced expertise to set up ProSight Data Protection Services to be compliant with government and industry regulatory requirements such as HIPAA, FINRA, PCI and Safe Harbor and, whenever necessary, can help you to recover your business-critical data. Learn more about ProSight Data Protection Services Managed Backup and Recovery.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the technology of leading data security vendors to provide web-based management and world-class security for your inbound and outbound email. The powerful structure of Email Guard integrates cloud-based filtering with an on-premises gateway appliance to provide advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne threats. Email Guard's cloud filter acts as a first line of defense and blocks the vast majority of threats from making it to your security perimeter. This decreases your vulnerability to inbound threats and saves system bandwidth and storage. Email Guard's on-premises gateway device provides a further layer of inspection for inbound email. For outgoing email, the on-premises security gateway offers anti-virus and anti-spam filtering, DLP, and email encryption. The on-premises security gateway can also assist Microsoft Exchange Server to track and safeguard internal email that stays inside your security perimeter. For more details, visit Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and applications hosted in a protected Tier III data center on a fast virtual machine host configured and managed by Progent's network support professionals. With Progent's ProSight Virtual Hosting service model, the customer retains ownership of the data, the OS software, and the apps. Since the environment is virtualized, it can be ported immediately to a different hosting environment without requiring a time-consuming and difficult reinstallation process. With ProSight Virtual Hosting, you are not locked into one hosting provider. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, update, find and safeguard data related to your IT infrastructure, processes, applications, and services. You can quickly locate passwords or serial numbers and be warned about upcoming expirations of SSLs ,domains or warranties. By cleaning up and organizing your network documentation, you can save up to 50% of time spent trying to find critical information about your IT network. ProSight IT Asset Management features a common location for storing and collaborating on all documents required for managing your business network such as recommended procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and associating IT data. Whether youíre planning improvements, doing maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the information you need the instant you need it. Learn more details about Progent's ProSight IT Asset Management service.
Certified Network Security Design
Every business should develop a carefully thought out security program that incorporates both preventive procedures and reaction plans. The proactive strategy is a collection of procedures that help to reduce security weaknesses. The reactive strategy assists your security engineers to evaluate the impact caused by an attack, repair the system, document the event, and get the IT network restored as quickly as feasible.
Progent's expert information security consultants are available to help you to run a complete risk assessment and create a company-wide security strategy to establish security policies and mechanisms to reduce future assaults and dangers.
CISM Accredited Network Security Consulting Assistance
The Certified Information Security Manager (CISM) committee defines the basic competencies and worldwide standards of performance that information security managers are expected to learn. CISM gives executive management the confidence that consultants who have qualified for their CISM certification have the background and capability to provide efficient security administration and support consulting. Progent can provide the expertise of CISM Premier security professionals to assist companies with:
Learn additional details about Progent's CISM Information Security Engineering Services.
- Network Security Processes
- Vulnerability Management
- IS Security Program Management
- IS Security Administration
- Response Management
CISSP Certified Security Engineering Support
CISSP certification recognizes expertise with an international standard for data security. ANSI (American National Standards Institute) has awarded the CISSP credential accreditation in the area of data protection stipulated by ISO 17024. Progent offers the services of security consultants who have qualified for CISSP accreditation. Progent can provide a CISSP-certified expert to help your company in a variety security fields such as:
Read additional information concerning Progent's CISSP Qualified Cybersecurity Support Professionals.
- Security Administration Procedures
- Security Architecture and Paradigms
- Access Control Systems and Processes
- Applications Development Security
- Secure Operations
- Site Security
- Data Encryption Technology
- Telecom, LAN and WAN Security
- Business Continuity Preparedness
CISSP-ISSAP Qualified Secure Information System Architecture Engineering Services
Progent's CISSP-ISSAP Certified IT architecture professionals are experts who have earned ISSAP status as a result of rigorous examination and significant experience with network security architecture. The Information System Security Architecture Professional (ISSAP) credential represents demonstrated skill in the most in-depth demands of information security architecture within the wider scope of information security knowledge required for CISSP certification. Progent's ISSAP-certified security specialists can help your business with all aspects of architecture security including.
Find out more information about Progent's ISSAP Qualified Secure System Architecture Support Expertise.
- Access Control Mechanisms and Techniques
- Phone System and System Infrastructure Security
- Encryption/Decryption Options
- Needs Analysis and Security Standards
- Business Continuity Planning and DRP
- Site Security
CISA Accredited Network Security Auditing Engineering Assistance
The Certified Information Systems Auditor (CISA) credential is an important achievement that indicates expertise in IS security auditing. Accredited by ANSI, the CISA accreditation has candidates pass an extensive test given by the ISACA professional group. Progent's CISA network security audit specialists can help your IT organization with:
Get more details about Progent's CISA Qualified Information System Security Auditing Consulting Services.
- Information Systems Audit Process
- Information Technology Enforcement
- Network Assets and Architecture Planned Useful Life
- Information Technology Service Delivery
- Safeguarding Data Resources
- Disaster Recovery Planning
Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC program was established by ISACA to verify a consultant's ability to plan, deploy, and support information system controls to mitigate risk. Progent offers the services of a CRISC-certified engineer to help you to create and execute a business continuity strategy that follows industry best practices identified by CRISC and geared to match your company's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC-certified network risk management engineers offer a range of risk evaluation services such as:
Find out additional information concerning Progent's CRISC Risk Management Experts.
- Collect data and review documentation to help identify major risk scenarios
- Identify legal, industry, and business mandates and organizational policies associated with your information system to determine their possible influence on your business goals
- Identify potential vulnerabilities for your business processes to help in analyzing your corporate risk
- Create a risk awareness initiative and provide seminars to ensure your stakeholders appreciate IS risk so they can contribute to your risk management process
- Connect key risk scenarios to related business processes to help assign risk ownership
- Determine risk appetite with your senior management and major stakeholders to ensure they align
GIAC Certified Network Security Consulting Services
Find out additional information about Progent's GIAC Information Assurance Expertise.
GIAC (Global Information Assurance Certification) was established in 1999 to certify the skill of information technology security professionals. GIAC's goal is to make sure that a certified security consultant possesses the knowledge needed to provide services in vital areas of network, information, and program security. GIAC accreditations are acknowledged by companies and institutions around the world including and the U.S. NSA. Progent's GIAC-certified network security audit engineers are available to assist your business in the areas of:
Talk to a Certified Progent Security Expert
To learn how to access a Progent security consultant for remote or on-premises help in New York, call 1-800-993-9400 or visit Remote Network Help.