Company computer networks in the state of New York can depend on prompt and economical remote access to Progent's qualified security engineers to resolve critical security problems. Rates are reasonable, charges are per minute, sign-up is immediate, and service is world class. Progent also offers help for long-term projects that demand the knowledge of seasoned security engineers with high-level industry credentials.

If your New York company is based some distance from larger urban neighborhoods like New York City, Buffalo, Rochester, Yonkers, or Syracuse, the availability of nearby accredited network security support specialists could be problematic when you have a crisis. This can cause a drop in revenue for your business, upset clients, unproductive employees, and defocused management. By utilizing Progent's online services, you can get in touch with a Certified security consultant ready to deliver assistance whenever you have to have it to get your system on line and salvage your information.

Progent can assist you in all your initiatives to protect your network with support services ranging from network security audits to creating a comprehensive security strategy. Progent provides economical service to assist small and midsize companies to configure and manage safe networks based on Microsoft Windows and Cisco technology and that may include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X platforms as well as BYOD clients with Apple iOS handhelds or Android or Windows Phone devices.

Progent can also assist you to outsource spam blocking and defense against e-mail-based attacks. Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of leading data security companies to deliver web-based control and comprehensive protection for all your email traffic. The hybrid architecture of Progent's Email Guard managed service integrates cloud-based filtering with a local security gateway appliance to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne threats. The Cloud Protection Layer serves as a first line of defense and keeps most threats from reaching your network firewall. This decreases your exposure to external threats and conserves system bandwidth and storage. ProSight Email Guard's on-premises gateway device provides a deeper level of analysis for incoming email. For outgoing email, the local security gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also help Exchange Server to track and protect internal email that originates and ends inside your security perimeter.

Progent's certified professionals are accessible remotely or in person to provide a range of emergency or project-based IT security services such as:

If your company has an immediate need for computer security support, go to Progent's Urgent Remote Technical Support.

Progent's support professionals offer advanced support in key areas of network security that include auditing, firewalls and VPN, and high-level security planning.

System Audits
Progent's expert security engineers can assess the strength of your current computer security environment by performing comprehensive remote automated testing based on advanced utilities and proven procedures. Progent's experience in administering this service saves your company money and assures a detailed portrayal of gaps. The knowledge your business is provided can make up the foundation of a security strategy that will permit your information system to operate dependably and respond rapidly to new risks.

Automated Network Security Assessment
Progent provides consulting in the use of security analysis products such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard for affordably running a set of automatic network auditing checks to uncover potential security gaps. Progent has broad knowledge of additional network analysis tools such as NMAP, AMAP Application Scanner, eEye Vulnerability Scanner, plus tools like Metasploit Framework, Netcat, Socat, and Nikto. Progent can show you how to understand testing reports and respond appropriately.

Progent can show you how to build protection into your business processes, install auditing software, define and deploy a secure network environment, and recommend procedures to maximize the security of your IT system. Progent's security consultants are able to show you how to configure a firewall, implement safe remote access to email and data, and install VPN. Find out additional information concerning Progent's network security audits.

Security Inventory Scanning Packages for Small Businesses
Progent offers two low-cost security inventory and evaluation bundles designed to enable small businesses to get an impartial network security assessment from a certified security specialist. With Progent's External Network Security Inventory Scan, an engineer administers an extensive examination of your IT infrastructure from outside your firewall to uncover potential risks in the security profile you present to the public. With Progent's Internal Security Inventory Checkup, a security engineer executes a network scan from an authorized machine within your firewall to uncover vulnerabilities to internal threats. The two security inventory services are set up and executed from a protected remote location. The process is managed by a consultant with high-level security accreditations and who generates a document that details and interprets the information collected by the scan and proposes practical remediation where called for.

Stealth Intrusion Testing Support Services
Stealth intrusion checking is an important component of any successful IT system security plan. Progentís security experts can perform thorough penetration checks without the knowledge of your company's internal network support staff. Stealth penetration checking shows whether current security defense tools such as intrusion detection alerts and event history analysis are properly set up and actively monitored. Find out additional information concerning Progent's stealth security penetration analysis consulting.

Firewalls and VPN Support
Progent's expertise in security technology encompasses in-depth field work with leading firewalls and VPN technology from a variety of companies such as Cisco, Microsoft, and Juniper. Progent offers the support of consultants with important networking accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Configuration and Debugging
The new ASA 5500-X Family of firewalls with Firepower Services offer significantly more performance than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 firewalls for new deployments. Following Cisco's acquisition of Sourcefire, the whole line of ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort technology, which is the market's most popular network intrusion protection system (IPS). Firepower services provide enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can assist you to manage your legacy PIX or ASA 5500 security appliances or upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your business to design, integrate, optimize, manage and debug firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional details about Cisco ASA Firewalls with Firepower Services configuration and troubleshooting support.

Cisco Network Security and Virtual Private Network Support Services
Cisco's network security and remote connection technology provide a complete range of manageable security solutions to help protect your wired and wireless network infrastructure. Cisco's VPN line features routers, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's expert consulting staff includes experienced engineers with Cisco CCIE and CCNP certifications who can assist your organization to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that align best with your business objectives. Learn more details concerning Progent's Engineering Expertise for Cisco Security and VPN Products.

Support Services for Additional Firewall and VPN Products
Progent provides small and mid-size organizations expert consulting for Intrusion Protection products and IPsec VPN solutions from leading firewall and VPN security companies such as WatchGuard, Juniper, and SonicWall. Progent can show you how to create a comprehensive security strategy and choose appropriate products from multiple suppliers to support your security goals while sticking within your spending restraints.

Progent's Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight line of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. ProSight managed services offered by Progent include:

ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates next generation behavior analysis technology to guard endpoint devices as well as physical and virtual servers against modern malware attacks such as ransomware and email phishing, which routinely escape legacy signature-matching anti-virus products. ProSight ASM protects local and cloud resources and provides a unified platform to automate the complete threat lifecycle including protection, infiltration detection, mitigation, remediation, and forensics. Key features include one-click rollback with Windows VSS and automatic network-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.

ProSight Enhanced Security Protection: Unified Endpoint Security
Progent's ProSight Enhanced Security Protection managed services offer economical multi-layer protection for physical servers and VMs, workstations, mobile devices, and Microsoft Exchange. ProSight ESP utilizes adaptive security and modern behavior analysis for continuously monitoring and reacting to security assaults from all attack vectors. ProSight ESP offers two-way firewall protection, penetration alerts, device control, and web filtering via cutting-edge technologies incorporated within a single agent accessible from a single console. Progent's security and virtualization consultants can assist you to design and configure a ProSight ESP deployment that meets your organization's unique needs and that helps you demonstrate compliance with legal and industry information protection regulations. Progent will help you specify and implement security policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alerts that require urgent attention. Progent can also assist you to install and verify a backup and restore solution like ProSight Data Protection Services so you can recover quickly from a potentially disastrous cyber attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Microsoft Exchange filtering.

ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services offer small and mid-sized businesses an affordable end-to-end service for secure backup/disaster recovery. Available at a low monthly rate, ProSight Data Protection Services automates and monitors your backup activities and enables rapid restoration of critical files, applications and virtual machines that have become lost or corrupted as a result of component breakdowns, software glitches, disasters, human error, or malware attacks like ransomware. ProSight DPS can help you protect, recover and restore files, folders, applications, system images, as well as Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to a local storage device, or to both. Progent's backup and recovery specialists can deliver world-class expertise to set up ProSight DPS to be compliant with regulatory requirements such as HIPPA, FINRA, PCI and Safe Harbor and, whenever needed, can assist you to restore your critical data. Learn more about ProSight Data Protection Services Managed Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the infrastructure of leading data security vendors to provide centralized management and world-class protection for your email traffic. The powerful structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local security gateway appliance to offer complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. Email Guard's cloud filter serves as a preliminary barricade and keeps the vast majority of threats from making it to your security perimeter. This decreases your exposure to inbound threats and saves system bandwidth and storage. Email Guard's onsite security gateway device adds a deeper level of analysis for inbound email. For outgoing email, the local security gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The onsite security gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email that stays within your corporate firewall. For more information, visit ProSight Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small organization can have its critical servers and applications hosted in a protected Tier III data center on a fast virtual host configured and managed by Progent's network support professionals. With Progent's ProSight Virtual Hosting model, the client retains ownership of the data, the operating system software, and the apps. Because the environment is virtualized, it can be moved easily to a different hardware solution without a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, you are not tied one hosting service. Learn more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, maintain, retrieve and protect data about your network infrastructure, procedures, applications, and services. You can quickly find passwords or IP addresses and be warned automatically about upcoming expirations of SSLs or warranties. By updating and managing your network documentation, you can eliminate as much as 50% of time spent trying to find critical information about your network. ProSight IT Asset Management includes a common location for storing and sharing all documents required for managing your business network like recommended procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT information. Whether youíre planning enhancements, performing maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the knowledge you require as soon as you need it. Learn more about ProSight IT Asset Management service.

Certified Security Consulting
Every company ought to have a carefully considered security program that incorporates both proactive procedures and reaction plans. The pre-attack strategy is a set of mechanisms that help to reduce security weaknesses. The reactive strategy assists your network security personnel to evaluate the impact caused by an attack, repair the system, record the experience, and get the IT network running as rapidly as feasible.

Progent's certified information security engineers can to assist your business to perform a comprehensive risk assessment and create a network security strategy to implement security processes and mechanisms to mitigate future assaults and dangers.

CISM Accredited Security Engineering Assistance
The CISM organization defines the core capabilities and global standards of performance that IT security professionals are required to master. CISM gives business management the confidence that those who have qualified for their CISM credential possess the background and knowledge to provide efficient security administration and consulting services. Progent offers the expertise of CISM Certified security professionals to help companies with:

  • Information Security Strategies
  • Vulnerability Management
  • Information Security Program Management
  • Information Security Management
  • Recovery Management
Learn more information about Progent's CISM Accredited IS Security Support Services.

CISSP Qualified Security Engineering Assistance
CISSP certification denotes expertise with an international standard for network security. ANSI has granted certification recognition in the area of information protection under ISO/IEC 17024. Progent can provide the services of security consultants who have earned CISSP accreditation. Progent can provide a CISSP-certified professional to help your company in a variety security areas including:

  • Security Administration Practices
  • Security Infrastructure and Paradigms
  • Access Management Systems and Methodology
  • Software Development Security
  • Secure Operations
  • Physical Security
  • Encryption/Decryption Mechanisms
  • Telecommunications, LAN and Internet Security
  • Business Continuity Planning
Read additional details about Progent's CISSP Accredited Information Security Support Expertise.

CISSP-ISSAP Qualified Secure Information System Architecture Engineering Assistance
Progent's CISSP-ISSAP Premier information system architecture professionals are consultants who have earned ISSAP status as a result of thorough testing and extensive work with network security architecture. The ISSAP certification represents proven mastery in the most in-depth demands of information security architecture bounded by the wider field of information security expertise needed for CISSP certification. Progent's ISSAP-certified security specialists can help your business with all phases of secure network architecture such as.

  • Access Control Mechanisms and Techniques
  • Phone System and Network Security
  • Encryption/Decryption Options
  • Requirements Evaluation and Security Criteria
  • Business Continuity Planning (BCP) and Disaster Recovery Planning
  • Hardware Security
Find out more information about Progent's ISSAP Accredited Secure Network Architecture Engineering Professionals.

CISA Accredited Network Security Auditing Engineering Expertise
The Certified Information Systems Auditor (CISA) accreditation is a globally recognized qualification that represents mastery in network security audit and control. Accredited by ANSI, the CISA accreditation requires that candidates undergo an extensive examination given by the ISACA professional association. Progent's CISA-certified network security audit specialists are available to help your company in the areas of:

  • Information Systems Audit Services
  • Information Technology Administration
  • Systems and Architecture Planned Useful Life
  • IT Service Delivery
  • Safeguarding Information Resources
  • Business Continuity Preparedness
Get the details about Progent's CISA Certified Information System Security Auditing Engineering Support.

CRISC Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA to verify a consultant's skills to design, implement, and support information system controls to reduce network risk. Progent offers the services of a CRISC-certified engineer to help you to develop and execute a workplace continuity strategy based on leading practices identified by CRISC and geared to match your organization's risk appetite, business objectives, and IT budget. Progent's CRISC-certified IT risk mitigation engineers can provide a range of risk evaluation services such as:

  • Gather data and study documentation to evaluate significant risk scenarios
  • Identify statutory, regulatory, and contractual requirements and company standards related to your network to assess their possible influence on your business goals
  • Identify potential vulnerabilities for your operational workflows to help in evaluating your corporate risk
  • Create a risk awareness program and provide training to make sure your organization appreciate IT risk so they can contribute to your risk control program
  • Connect key risk vectors to your associated business procedures to help assign risk ownership
  • Validate risk appetite with your senior leadership and major stakeholders to make sure they are in agreement
Read more details about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Certified IS Security Consulting Assistance
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the skill of information technology security professionals. GIAC's goal is to assure that an accredited professional possesses the knowledge appropriate to deliver services in vital categories of network, data, and application security. GIAC certifications are acknowledged by businesses and government organizations around the world including and the United States National Security Agency. Progent's GIAC-qualified network security audit consultants can help your business with:

  • Assessing IT Infrastructure
  • Security Incident Handling
  • Intrusion Detection
  • Web Application Security
  • SIEM solutions
Find out additional information concerning Progent's GIAC Information Assurance Services.

Talk to a Certified Progent Security Engineer
To learn how you can access a certified security engineer for remote or onsite assistance in New York, phone 1-800-993-9400 or visit Online Network Support.