Business networks in New York can now get quick and economical remote help from Progent's certified network security engineers to fix urgent security issues. The cost is reasonable, billing is by the minute, engagement is immediate, and support is unbeatable. Progent also offers assistance for long-term projects that demand the expertise of seasoned security engineers with top security credentials.

In case your New York network is based some distance from larger metropolitan areas including New York City, Buffalo, Rochester, Yonkers, or Syracuse, contact with local accredited network security support specialists could be limited when you have an emergency. This can cause a loss of revenue for your business, angry customers, idle employees, and defocused management. By calling Progent's online services, you can get in touch with a Certified security professional who can deliver help when you require it to get your computer network running and salvage your data.

Progent can help you in your initiatives to defend your IT environment with support that ranges from network security checks to creating a comprehensive security plan. Progent provides affordable support to help companies of any size to design and maintain protected IT environments based on Microsoft Windows and Cisco products and that may include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X operating systems plus mobile users with Apple iOS iPhones and iPads or Google Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam blocking and defense against e-mail-based security threats. Email Guard is Progent's email security solution that uses the technology of leading information security companies to provide centralized management and world-class protection for your inbound and outbound email. The hybrid architecture of Progent's Email Guard integrates a Cloud Protection Layer with a local security gateway device to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based threats. ProSight Email Guard's cloud filter acts as a first line of defense and blocks most threats from making it to your network firewall. This decreases your vulnerability to external threats and saves system bandwidth and storage space. ProSight Email Guard's onsite gateway appliance adds a further level of analysis for incoming email. For outbound email, the local gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The local security gateway can also help Microsoft Exchange Server to monitor and safeguard internal email traffic that originates and ends inside your corporate firewall.

Progent's certified professionals are available remotely or in person to provide a variety of urgent or longer-term network security services which include:

If your business has an emergency need for computer security help, refer to Progent's Emergency Remote Technical Support.

Progent's consultants provide world-class services in key fields of network security including security assessment, firewall and VPN solutions, and advanced security consulting.

System Security Audits
Progent's expert security consultants can evaluate the effectiveness of your current computer security systems by performing exhaustive remote automated testing based on advanced utilities and proven procedures. Progent's experience in this testing saves you time and money and offers a detailed picture of security holes. The knowledge your company gains can form the foundation of a network protection plan that will allow your information system to operate dependably and respond quickly to new threats.

Automated Network Vulnerability Assessment
Progent provides expertise in the application of security evaluation software such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard Network Security Scanner for affordably performing a set of automatic system testing checks to uncover possible security gaps. Progent has extensive experience with other network analysis products including NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, as well as tools like SolarWinds, Netcat, and Nikto. Progent can help you to make sense of audit reports and respond appropriately.

Progent can help you design protection into your business processes, configure auditing tools, define and deploy a protected network architecture, and recommend policies to maximize the safety of your network. Progent's security engineers are available to assist you to configure a firewall, design secure remote connectivity to email and business applications, and install VPN. Learn more concerning Progent's network security evaluation.

Security Inventory Packages for Small Businesses
Progent offers two ultra-affordable security inventory scanning packages intended to enable small companies to receive an impartial network security evaluation from a certified security consultant. With Progent's External Network Security Inventory Scan, a security engineer runs an extensive test of your IT infrastructure from beyond your company firewall to determine possible risks in the security posture you expose to the outside world. With Progent's Internal Security Inventory Checkup, a certified security professional runs a network scan from a secure computer within your firewall to evaluate your exposure to internal assaults. Both security inventory services are set up and executed from a protected external site. The project is managed by an engineer who has earned top security credentials and who generates a document that summarizes and interprets the information collected by the security scan and suggests practical remediation where appropriate.

Network Security Penetration Analysis Support Services
Stealth penetration testing is a key component of any serious network security plan. Progentís security professionals can perform extensive intrusion checks without the knowledge of your organization's internal IT resources. Unannounced penetration checking shows whether current security monitoring systems such as intrusion detection alerts and event log analysis are correctly set up and actively checked. Learn additional information about Progent's network penetration analysis consulting.

Firewalls and VPN Support
Progent's background in security technology includes in-depth familiarity with leading firewalls and Virtual Private Network (VPN) technology from a variety of vendors such as Cisco, Microsoft, and CheckPoint. Progent can provide the support of consultants who have earned key industry certifications including CCIE and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Debugging
The latest generation of ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide substantially more performance than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX firewalls for all new installations. Following Cisco's purchase of Sourcefire, the whole line of ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort product, which is the market's most popular network intrusion protection system (IPS). Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-premier CCIE network consultants can help your company to manage your legacy PIX or ASA 5500 security appliances or upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your company to design, deploy, optimize, manage and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Find out additional details about Cisco ASA Firewalls with Firepower Services configuration and troubleshooting support.

Cisco Network Security and VPN Engineering Services
Cisco's security and offsite access technology offer a full range of manageable security solutions to help safeguard your wired and wireless information system. Cisco's VPN line features routers, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's professional staff of consultants includes experienced engineers with Cisco CCIE and Cisco Certified Network Professional certifications who can help your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that align most closely with your business objectives. Read more details about Progent's Engineering Expertise for Cisco Security Solutions and Virtual Private Network Products.

Consulting Services for Additional Firewall and Virtual Private Network Technology
Progent offers small and medium size businesses professional consulting for Intrusion Protection products and IPsec VPN solutions from major firewall and VPN security vendors including WatchGuard, Juniper Networks, and Symantec. Progent can help you create a comprehensive security plan and select the right technologies from multiple suppliers to support your security goals while sticking within your spending limits.

Progent's Flat-rate Managed Services for Information Assurance
Progent's low-cost ProSight family of network monitoring and management services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. ProSight managed services available from Progent include:

ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates next generation behavior-based machine learning tools to defend endpoint devices and servers and VMs against modern malware attacks like ransomware and file-less exploits, which routinely evade traditional signature-based anti-virus products. ProSight ASM safeguards local and cloud-based resources and provides a single platform to manage the entire threat lifecycle including protection, identification, containment, remediation, and post-attack forensics. Key features include single-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against new threats. Find out more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) services deliver ultra-affordable in-depth security for physical servers and virtual machines, desktops, mobile devices, and Exchange email. ProSight ESP utilizes adaptive security and advanced heuristics for continuously monitoring and reacting to cyber assaults from all vectors. ProSight ESP delivers firewall protection, intrusion alerts, endpoint management, and web filtering through leading-edge technologies incorporated within a single agent managed from a unified control. Progent's security and virtualization experts can assist your business to design and configure a ProSight ESP deployment that meets your company's unique requirements and that helps you achieve and demonstrate compliance with legal and industry data security standards. Progent will assist you define and implement policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alarms that call for urgent action. Progent's consultants can also help your company to set up and verify a backup and restore system like ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous security attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Exchange filtering.

ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services provide small and medium-sized organizations an affordable end-to-end solution for secure backup/disaster recovery (BDR). For a low monthly price, ProSight Data Protection Services automates and monitors your backup processes and enables fast restoration of critical files, applications and virtual machines that have become unavailable or corrupted as a result of component failures, software bugs, disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, apps, system images, as well as Hyper-V and VMware images/. Important data can be protected on the cloud, to a local device, or to both. Progent's cloud backup specialists can provide advanced expertise to set up ProSight Data Protection Services to be compliant with regulatory standards like HIPPA, FINRA, and PCI and, when needed, can help you to recover your business-critical information. Learn more about ProSight Data Protection Services Managed Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the infrastructure of top data security vendors to provide web-based control and comprehensive protection for all your email traffic. The powerful structure of Email Guard managed service combines a Cloud Protection Layer with an on-premises gateway device to provide advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The cloud filter serves as a first line of defense and keeps the vast majority of unwanted email from making it to your security perimeter. This decreases your exposure to inbound attacks and conserves system bandwidth and storage. Email Guard's on-premises security gateway device adds a deeper level of inspection for incoming email. For outbound email, the onsite security gateway offers anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The local gateway can also assist Exchange Server to track and safeguard internal email that originates and ends within your corporate firewall. For more information, visit Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small business can have its critical servers and applications hosted in a protected fault tolerant data center on a fast virtual host configured and maintained by Progent's network support professionals. With the ProSight Virtual Hosting model, the customer owns the data, the OS platforms, and the applications. Since the environment is virtualized, it can be moved immediately to a different hosting solution without requiring a lengthy and difficult configuration process. With ProSight Virtual Hosting, your business is not tied one hosting provider. Find out more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, maintain, retrieve and protect information about your IT infrastructure, processes, applications, and services. You can instantly locate passwords or IP addresses and be alerted about impending expirations of SSLs or warranties. By updating and organizing your IT documentation, you can save as much as half of time spent looking for critical information about your IT network. ProSight IT Asset Management features a common repository for holding and sharing all documents required for managing your network infrastructure such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports advanced automation for gathering and relating IT information. Whether youíre making enhancements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the data you need when you need it. Find out more details about ProSight IT Asset Management service.

Certified Network Security Planning
Every business should have a carefully considered security program that incorporates both pre-attack processes and response planning. The pre-attack plan is a set of mechanisms intended to minimize vulnerabilities. The post-attack strategy assists your security engineers to assess the damage resulting from an attack, fix the network, record the experience, and get the IT network restored as quickly as possible.

Progent's certified information security consultants can to help your company to perform a complete vulnerability assessment and define a network security plan to implement security policies and mechanisms to mitigate future assaults and threats.

CISM Certified Security Consulting Services
The CISM committee describes the core capabilities and global standards of performance that IT security managers are required to master. CISM provides executive management the confidence that those who have qualified for their CISM credential possess the experience and knowledge to deliver effective security administration and consulting consulting. Progent offers the support of CISM Premier security consultants to help businesses with:

  • IS Security Processes
  • Risk Management
  • Network Security Implementation Management
  • Network Security Administration
  • Recovery Management
Read additional information concerning Progent's CISM Qualified Information Security Consulting Services.

CISSP Certified Security Consulting Support
CISSP denotes expertise with a worldwide standard for data security. The American National Standards Institute has granted certification accreditation in the area of information protection under ISO 17024. Progent offers the services of security professionals who have earned CISSP accreditation. Progent can give you access to a CISSP-certified consultant to help your organization in a variety security fields including:

  • Security Management Procedures
  • Security Architecture and Models
  • Access Control Systems and Methodology
  • Software Development Security
  • Secure Operations
  • Site Security
  • Data Encryption Mechanisms
  • Telecom, LAN and WAN Security
  • Business Continuity Preparedness
Learn more information about Progent's CISSP Accredited Cybersecurity Consulting Expertise.

CISSP-ISSAP Qualified Secure Information System Architecture Consulting Support
Progent's CISSP-ISSAP Certified network architecture professionals are experts who have been awarded ISSAP Certification through thorough examination and extensive experience with information security design. The Information System Security Architecture Professional (ISSAP) credential indicates demonstrated competence in the more complex demands of information system security architecture within the wider scope of IS security expertise needed for CISSP certification. Progent's ISSAP-premier security specialists can help your company with all phases of architecture security such as.

  • Access Control Mechanisms and Techniques
  • Telecom and Network Infrastructure Protection
  • Data Encryption Solutions
  • Requirements Evaluation and Security Criteria
  • Business Continuity Planning and Disaster Recovery Planning
  • Physical Security
Find out additional information about Progent's ISSAP Certified Secure Information System Architecture Support Expertise.

CISA Accredited Information System Security Auditing Consulting Expertise
The Certified Information Systems Auditor accreditation is a recognized achievement that signifies mastery in IS security auditing. Accredited by ANSI, the CISA credential requires that consultants pass a comprehensive test given by the ISACA international professional association. Progent's CISA-certified information security audit experts are available to help your company with:

  • IS Audit Process
  • IT Enforcement
  • Network Assets and Architecture Lifecycle Planning
  • Information Technology Support
  • Protecting Data Assets
  • Disaster Recovery Planning
Learn more information about Progent's CISA Accredited Network Security Auditing Engineering Assistance.

CRISC Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA in 2010 to verify a consultant's ability to design, deploy, and maintain information system controls to mitigate network risk. Progent offers the expertise of a CRISC-certified consultant to help your company to create and execute a business continuity or disaster recovery plan that follows industry best practices identified by CRISC and crafted to align with your company's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC-qualified network risk management specialists can provide a variety of risk assessment services including:

  • Collect data and review documentation to evaluate major vulnerabilities
  • Inventory legal, industry, and business mandates and organizational standards associated with your network to assess their potential influence on your strategic goals
  • Identify potential threats for your business workflows to assist in evaluating your enterprise risk
  • Develop a risk awareness initiative and provide seminars to make sure your stakeholders appreciate IS risk so they can assist with your risk management process
  • Match key risk vectors to related operational procedures to help assign risk responsibility
  • Determine risk appetite with your senior management and key stakeholders to ensure they match
Get the details about Progent's CRISC Risk Management Consultants.

GIAC Accredited Security Consulting Services
Global Information Assurance Certification was established in 1999 to certify the knowledge of information technology security experts. GIAC's goal is to ensure that an accredited professional has the skills needed to deliver support in key areas of system, information, and software security. GIAC certifications are acknowledged by businesses and institutions around the world including and the U.S. National Security Agency. Progent's GIAC-certified information security audit experts can assist your company in the areas of:

  • Assessing Perimeters
  • Security Incident Response
  • Intrusion Detection
  • Web Services Security
  • SIEM solutions
Find out additional information concerning Progent's GIAC Information Assurance Services.

Contact a Security Engineer
To see how to get in touch with a certified Progent security consultant for remote or onsite expertise in New York, phone 1-800-993-9400 or go to Online Computer Support.