Greater New York City Metro Area Contact Information:
Progent locations in the Greater New York Metro Area
||260 Madison Ave
New York, New York, 10016
|Sales Phone: 646-727-4666
Link: New York Network Support Services
|Wall Street, NY
New York, New York, NY 10006
|Sales Phone: 646-969-5696
Link: New York Network Support Services
||One Gateway Center
Newark, New Jersey, 07102
|Sales Phone: 862-373-1253
Link: Newark Network Support Services
||2001 Route 46
Parsippany, New Jersey, 07054
|Sales Phone: 973-939-0009
Link: New Jersey Network Support Services
|Saddle Brook, NJ
||Park 80 West
250 Pehle Avenue
Saddle Brook, New Jersey, 07663
|Sales Phone: 562-583-3336
Link: Saddle Brook, NJ Network Support Services
||1650 Market St
Philadelphia, Pennsylvania, 19103
|Sales Phone: 267-592-4430
Link: Philadelphia Network Support Services
For fast remote help with network security problems, businesses in New York City, NY, can find expert troubleshooting by contacting Progent's security professionals. Progent's online support consultants are ready to provide fast and affordable help with security issues that are impacting the productivity of your information system. Progent's accredited consultants are certified to provide help for environments based on Windows, Linux, macOS and OS X, Solaris, and major versions of UNIX. Progent's wide array of services encompasses firewall expertise, email security, protected system infrastructure, and disaster recovery planning. Progent's technical support team has been awarded the industry's top security accreditations including Certified Information Systems Auditor and CISSP.
Progent offers remote security support on a by-the-minute model without minimum call duration and no additional fees for setup or after hours service. By charging per minute and by delivering world-class support, Progent's billing policy keeps expenses under control and eliminates situations where simple fixes result in big bills.
We've Been Attacked: What Can We Do?
If your network is now experiencing a security emergency, go to Progent's Emergency Remote Network Help to learn how to receive fast assistance. Progent maintains a team of seasoned network security experts who can provide online and on-premises assistance that includes containment, mitigation, recovery, forensics, and hardening of your security defense to protect against future attacks.
For companies who have planned carefully for an attack, the step-by-step post-attack response model promoted by GIAC (Global Information Assurance Certification) is Progent's preferred method of handling a serious security penetration.
Overview of Progent's Security Expertise
Coordinating network protection plus preparation for recovering vital information and functions following an attack demands a continual program that entails an array of tools and processes. Progent's certified engineers can assist your business at any level in your efforts to protect your information network, ranging from security audits to creating a comprehensive security plan. Key areas covered by Progent's experts include Security Planning and Implementation, Information Recovery and Security Failure Analysis, and Outsourced Protection from E-mail-Based Attacks.
Designing and Implementing Protected Environments
Every organization should have a carefully thought out security strategy that incorporates both preventive and reactive activity. The proactive strategy is a set of precautions that works to minimize vulnerabilities. The post-attack strategy defines procedures to assist IT staff to evaluate the damage caused by an attack, remediate the damage, document the experience, and revive network functions as soon as possible. Progent can advise you how to incorporate protection into your company operations. Progent can configure scanning software, define and implement a safe computer architecture, and propose processes and policies to enhance the safety of your information system. Progent's security professionals are available to assist you to configure a firewall, deploy safe offsite connectivity to e-mail and data, and configure an effective virtual private network.
If your company is looking for an economical option for outsourcing your network security management, Progent's Round-the-clock Monitoring Packages feature automated online system monitoring and fast response to emergencies.
Hybrid Cloud Solutions
Progent can assist your company you to plan, deploy, manage and troubleshoot enterprise hybrid cloud solutions that combine local and cloud-based resources and that comply with regulatory security requirements. (Learn about Progent's Office 365 integration with on-premises installations of Exchange, Azure enterprise hybrid cloud integration and Progent's Amazon Web Services enterprise hybrid cloud solutions.)
Data Restoration and Failure Analysis
Progent offers expertise in recovering networks and computers that have been hacked, are suspect, or have ceased to function because of a security attack. Progent can show you how to determine the losses resulting from the assault, restore normal functions, and retrieve data lost owing to the event. Progent's certified specialists can also oversee a comprehensive failure evaluation by examining activity logs and using a variety of advanced assessment techniques. Progent's background with security problems reduces your downtime and permits Progent to recommend efficient measures to avoid or mitigate future assaults.
Progent's Flat-rate Managed Services for Information Assurance
Progent's affordable ProSight line of outsourced network management services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance. Managed services offered by Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes next generation behavior machine learning tools to guard endpoint devices as well as physical and virtual servers against new malware attacks like ransomware and email phishing, which routinely evade legacy signature-matching AV tools. ProSight ASM safeguards local and cloud resources and offers a single platform to automate the entire malware attack progression including protection, detection, mitigation, remediation, and forensics. Key capabilities include single-click rollback with Windows Volume Shadow Copy Service and real-time network-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection (ESP) services offer economical in-depth security for physical servers and VMs, workstations, smartphones, and Exchange Server. ProSight ESP utilizes contextual security and advanced heuristics for continuously monitoring and reacting to security assaults from all attack vectors. ProSight ESP provides two-way firewall protection, intrusion alarms, device management, and web filtering through leading-edge technologies incorporated within one agent accessible from a single console. Progent's data protection and virtualization consultants can help your business to design and implement a ProSight ESP deployment that addresses your company's specific requirements and that allows you achieve and demonstrate compliance with government and industry data security regulations. Progent will assist you specify and implement policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alerts that require immediate action. Progent's consultants can also help you to install and test a backup and disaster recovery system such as ProSight Data Protection Services (DPS) so you can recover quickly from a destructive cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Exchange filtering.
ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services from Progent offer small and mid-sized businesses an affordable and fully managed service for secure backup/disaster recovery (BDR). For a fixed monthly rate, ProSight Data Protection Services automates and monitors your backup processes and allows rapid recovery of critical data, apps and virtual machines that have become unavailable or corrupted due to hardware breakdowns, software glitches, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, applications, system images/, as well as Microsoft Hyper-V and VMware images/. Critical data can be backed up on the cloud, to an on-promises device, or mirrored to both. Progent's BDR consultants can deliver advanced expertise to set up ProSight Data Protection Services to be compliant with government and industry regulatory standards such as HIPPA, FINRA, and PCI and, when needed, can help you to restore your critical information. Find out more about ProSight Data Protection Services Managed Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the infrastructure of top data security companies to deliver web-based control and comprehensive security for all your email traffic. The hybrid structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local gateway appliance to provide complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne threats. Email Guard's cloud filter serves as a preliminary barricade and blocks the vast majority of threats from reaching your network firewall. This reduces your exposure to inbound threats and saves system bandwidth and storage space. Email Guard's on-premises security gateway device adds a further layer of analysis for incoming email. For outbound email, the local gateway provides anti-virus and anti-spam protection, DLP, and email encryption. The local gateway can also help Exchange Server to track and protect internal email that originates and ends within your security perimeter. For more information, see ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its key servers and applications hosted in a protected fault tolerant data center on a fast virtual host configured and maintained by Progent's network support experts. With the ProSight Virtual Hosting model, the client owns the data, the operating system platforms, and the apps. Because the system is virtualized, it can be ported easily to an alternate hosting solution without requiring a time-consuming and technically risky reinstallation procedure. With ProSight Virtual Hosting, your business is not locked into a single hosting provider. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, maintain, retrieve and protect information about your network infrastructure, processes, business apps, and services. You can quickly find passwords or IP addresses and be alerted automatically about upcoming expirations of SSLs or domains. By updating and organizing your IT infrastructure documentation, you can eliminate as much as half of time spent looking for vital information about your network. ProSight IT Asset Management features a centralized location for holding and collaborating on all documents required for managing your network infrastructure such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports a high level of automation for gathering and relating IT information. Whether you’re making improvements, doing regular maintenance, or responding to a crisis, ProSight IT Asset Management delivers the information you require when you need it. Learn more details about Progent's ProSight IT Asset Management service.
Special Security Services Available from Progent
Progent's security engineers offer world-class specialized help in vital facets of IT security including:
Security Vulnerability Audits and Security Compliance Assessment
Progent offers expertise with security auditing software like Microsoft Baseline Security Analyzer and LANguard for performing a set of automatic network tests to uncover possible security gaps. Progent has extensive experience with testing utilities and can help you to understand assessment reports and react appropriately. Progent's security consultants also can perform web application testing and can conduct thorough assessments of corporate-wide security to assess your company's compliance with major global security standards such as FISMA, NIST, and ISO. Also, Progent can assess the effectiveness of your wireless security covering stationary wireless appliances plus mobile handsets. Read more details about Progent's Vulnerability Evaluation and Security Compliance Testing.
Cisco Network Security, PIX Firewall and ASA Firewall, Virtual Private Network (VPN), Aironet and Meraki Wireless Help
Progent's Cisco Certified Internetwork Experts (CCIEs) and Cisco CCNP experts can provide in-depth technical services for Cisco's complete range of security and VPN solutions such as PIX 500 Firewalls and ASA Series Firewalls, the Catalyst Firewall Services Module, secure broadband and IS routers, Aironet wireless access points, Meraki cloud-managed APs, and Catalyst Series switches. Get more details concerning Cisco Security, VPN and Aironet Wireless Help.
Additional Firewall and Virtual Private Network (VPN) Solutions
Unannounced Penetration Checking Services
In addition to supporting a wide array of security solutions from Microsoft and Cisco, Progent offers companies of any size top-level consulting for solutions from other major firewall and Virtual Private Network vendors. Progent's engineers can provide:
Unannounced intrusion testing is a valuable technique for helping companies to determine how vulnerable their IT environments are to real-world threats by revealing how thoroughly corporate security policies and mechanisms hold up against authorized but unpublicized intrusion attempts instigated by veteran security specialists utilizing advanced intrusion methods. Read additional details concerning Progent's Penetration Testing Services.
CISM Security Support Expertise
Certified Information Security Manager (CISM) identifies the fundamental skills and worldwide standards of service that information technology security professionals are required to achieve. CISM provides executive management the assurance that consultants who have been awarded their certification have the background and skill to offer efficient security administration and engineering support. Progent can offer a CISM consultant to help your organization in critical security disciplines such as information protection governance, vulnerability management, data protection program control, and incident response management.
Find out more information about Progent's Certified Information Security Manager (CISM) Security Support Services.
Certified Information Systems Security Professionals (CISSP) Security Consulting Expertise
Progent's CISSP consultants are cybersecurity engineers who have been awarded CISSP certification through demonstrated professional work, extensive study, and formal examination. CISSP qualification indicates expertise in an international standard for information security. American National Standards Institute has given the CISSP status accreditation in the area of information security under ISO/IEC 17024. Areas of knowledge included within CISSP include cybersecurity management procedures, security design and test systems, access permission methodology, software development security, business processes security, physical security, cryptography, communications, Internet security, and business continuity planning.
Get more details concerning Progent's CISSP Support Services.
CISSP-ISSAP Qualified Consultants for Secure System Architecture
Progent's ISSAP qualified security experts are specialists who have been awarded ISSAP accreditation following thorough examination and extensive hands-on work with network security design. ISSAP security experts have comprehensive knowledge of access control systems and methodologies, phone system and network protection, cryptography, needs evaluation, business continuity planning (BCP) and disaster recovery planning (DRP), and physical security integration. Progent's ISSAP-qualified security consultants can assist your business with all phases of architecture security.
Get more information concerning Progent's ISSAP Accredited Protected IT Architecture Engineering Support.
CISSP-ISSEP Qualified Security Engineering Experts
Cybersecurity consultants with CISSP-ISSEP (Information Systems Security Engineering Professional) certification have shown their ability to provide large organizations with the services associated with a senior systems engineer, information assurance systems engineer, information assurance officer, information assurance analyst, or senior cybersecurity analyst. Progent offers the skills of a certified CISSP-ISSEP cybersecurity consultant to assist your organization to follow current system security engineering theory and techniques in system development, review and evaluate system security designs based on cybersecurity engineering leading practices, create cohesive system designs that incorporate compliant security mechanisms for all critical system functions, define efficient configuration strategies to provide operational security, perform comprehensive risk analysis, and recommend realistic security solutions that balance your operational requirements with your company's tolerance for risk.
Find out more about Progent's CISSP-ISSEP Cybersecurity Engineering Consulting.
Certified Information Systems Auditor Support Services
The Certified Information Systems Auditor accreditation is a recognized achievement that represents expertise in IS security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA credential has candidates pass a comprehensive test overseen by the ISACA professional association. Progent can provide the expertise of a CISA-qualified security audit consultant able to help companies in the fields of information systems audit process, IT enforcement, network assets and infrastructure planned useful life, IT support, safeguarding data resources, and business continuity preparedness.
Get additional information about Progent's Certified Information Systems Auditor Support Services.
CRISC-certified Risk Management Specialists
The CRISC program was initiated by ISACA to validate a consultant's skills to design, deploy, and support IS control mechanisms to mitigate network risk. Progent can provide the services of a CRISC-certified consultant to assist you to create and carry out a business continuity strategy that follows leading practices promoted by CRISC and crafted to match your company's risk tolerance, business goals, and IT budget. Progent's risk mitigation services are complementary to the services provided by Progent's CISA-qualified consultants for impartially assessing your IS control mechanisms and with the services of Progent's CISM consultants for designing security policies and procedures.
Read more details about Progent's CRISC Network Risk Mitigation Services.
Global Information Assurance Certification Professional Services
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the knowledge of network security professionals. GIAC's mission is to make sure that a certified professional has the knowledge necessary to deliver services in important categories of system, information, and application program security. GIAC accreditations are acknowledged by businesses and government organizations around the world including U.S. NSA. Progent can provide the assistance of certified professionals for all of the network security services covered within GIAC certification topics including assessing IT infrastructure, security incident response, intrusion detection, web-based services security, and SIEM solutions.
Learn more details concerning Progent's GIAC Information Assurance Support.
Depend on Progent for Network Security Help
If your company is situated in New York City or elsewhere in New York and you need network security help, call Progent at 800-993-9400 or visit Contact Progent.