Business information networks in Connecticut can depend on fast and economical online help from Progent's accredited security professionals to assist with urgent security issues. Rates are reasonable, charges are by the minute, engagement is fast, and service is world class. Progent also provides assistance for complex projects that requires the expertise of senior security engineers with top industry credentials.
If your Connecticut office is located some distance from more populated metropolitan areas such as Bridgeport, New Haven, Hartford, or Stamford, support from nearby certified network security professionals may be problematic during an urgent situation. This can result in lost income for your company, angry clients, unproductive workers, and distracted executives. By utilizing Progent's remote support, you can get in touch with a certified security consultant ready to deliver assistance whenever you have to have it to keep your computer network on line and salvage your information.
Progent can assist you in all your efforts to protect your information system with support that can range from security checks to developing a company-wide security plan. Progent offers affordable service to help companies of any size to design and manage safe networks based on Windows and Cisco products and that can include servers and desktops running UNIX or Linux operating systems plus mobile users with Apple iOS iPhones and iPads or Android or Windows Phone handsets.
Progent can also assist you to outsource spam blocking and protection from e-mail-based security threats. Email Guard is Progent's email filtering and encryption platform that uses the services and infrastructure of leading data security companies to deliver web-based management and comprehensive security for all your email traffic. The hybrid architecture of Email Guard managed service combines a Cloud Protection Layer with a local gateway appliance to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne malware. ProSight Email Guard's cloud filter serves as a first line of defense and blocks most unwanted email from making it to your network firewall. This decreases your exposure to inbound threats and conserves system bandwidth and storage space. ProSight Email Guard's onsite gateway appliance adds a deeper layer of inspection for inbound email. For outbound email, the local gateway offers AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The local security gateway can also enable Exchange Server to track and protect internal email that originates and ends within your security perimeter.
Progent's security consultants are accessible online or on site to offer a range of emergency or longer-term computer security services which include:
If your company has an urgent requirement for computer security help, go to Progent's Urgent Remote Network Help.
- Perform thorough security audits
- Clean up promptly after virus and worm attacks
- Configure effective firewalls
- Configure secure solutions for offsite and mobile connectivity
- Deploy advanced software for automatic protection against viruses, spam and DHAs
- Help create a comprehensive security plan with round-the-clock network monitoring
- Offer comprehensive Help Desk Support
- Create a practical data backup and restore plan based on Microsoft DPM backup technology
Progent's consultants provide world-class support in key areas of system protection that include security assessment, firewall and VPN solutions, and high-level security planning.
Progent's certified security engineers can assess the effectiveness of your existing network security systems by performing comprehensive remote automated testing via advanced software tools and proven techniques. Progent's skill in administering this service saves your company money and assures a detailed picture of gaps. The knowledge your company is provided can make up the foundation of a network protection strategy that can allow your network to operate dependably and respond rapidly to new risks.
Automated Vulnerability Audits
Progent provides consulting in the application of security auditing products including Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard for affordably performing a variety of automatic network auditing scans to uncover potential security weaknesses. Progent has extensive knowledge of additional network analysis tools including NMAP Port Scanner, AMAP, eEye Vulnerability Scanner, plus utilities like Metasploit Framework, Netcat, Socat, and Nikto. Progent can help you to understand testing reports and react effectively.
Progent can show you how to build protection into your business operations, install scanning software, plan and deploy a secure network environment, and suggest policies to maximize the security of your IT system. Progent's security consultants are available to assist you to set up a firewall, design safe remote access to email and data, and integrate VPN. Find out additional information on Progent's network security audits.
Security Inventory Service Bundles for Small Businesses
Progent has put together two low-cost security inventory and evaluation packages designed to allow small businesses to get a professional network security evaluation from an accredited security engineer. With Progent's External Security Inventory Scan, a security engineer runs an extensive examination of your network from outside your company firewall to uncover possible risks in the security profile you expose to the outside world. With Progent's Internal Security Inventory Checkup, a security expert runs a system scan from a secure machine within your firewall to evaluate your exposure to inside attacks. The two security inventory packages are configured and executed from a protected remote site. The process is overseen by a consultant who has earned top security credentials and who produces a report that summarizes and interprets the information captured by the security scan and suggests cost-effective improvements if called for.
Network Intrusion Analysis Support Services
Stealth penetration testing is an important component of any comprehensive IT system security strategy. Progentís security professionals can run thorough intrusion tests without the knowledge of your organization's in-house IT staff. Stealth penetration checking shows whether current security defense tools such as intrusion detection warnings and event history analysis are correctly configured and consistently checked. Learn more about Progent's network security penetration testing consulting.
Firewalls and VPN Solutions
Progent's background in network security solutions encompasses in-depth field work with leading firewalls and Virtual Private Network products from a variety of companies such as Cisco, Microsoft, and Juniper. Progent can provide the support of engineers who have earned important industry accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Integration and Debugging
The latest generation of ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer substantially more performance than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX firewalls for all new installations. Following Cisco's acquisition of Sourcefire, the whole line of ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the world's most popular network intrusion protection system (IPS). Firepower services provide powerful new features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network consultants can assist you to manage your current PIX or ASA 5500 security appliances and migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your company to design, configure, tune, administer and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. See more details about ASA Firewalls with Firepower Services configuration and troubleshooting services.
Cisco Network Security and Virtual Private Network Consulting Expertise
Cisco's security and offsite access products offer a comprehensive range of manageable security solutions to help safeguard your local and remote information system. Cisco's VPN product family includes routers, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's professional consulting staff includes field-proven engineers with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional certifications who are able to assist your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that align most closely with your business goals. Read more information about Progent's Support Expertise for Cisco Security and VPN Appliances.
Engineering Services for Other Firewall and VPN Solutions
Progent offers small and mid-size companies professional support for Intrusion Protection Systems and IPsec VPN products from leading firewall and Virtual Private Network security vendors including WatchGuard, Juniper Networks, and SonicWALL. Progent can show you how to design a detailed security strategy and choose the right technologies from a variety of vendors to support your security goals while staying within your budget restraints.
Progent's Low-Cost Managed Services for Information Assurance
Progent's value-priced ProSight portfolio of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) solution that utilizes cutting edge behavior machine learning tools to guard endpoint devices and physical and virtual servers against new malware assaults like ransomware and email phishing, which routinely escape traditional signature-based AV tools. ProSight ASM safeguards on-premises and cloud resources and provides a unified platform to manage the entire malware attack lifecycle including blocking, infiltration detection, containment, remediation, and forensics. Top capabilities include one-click rollback using Windows VSS and real-time system-wide immunization against newly discovered attacks. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) services offer economical in-depth protection for physical and virtual servers, desktops, smartphones, and Microsoft Exchange. ProSight ESP utilizes contextual security and modern behavior analysis for continuously monitoring and reacting to security threats from all attack vectors. ProSight ESP delivers firewall protection, penetration alerts, device management, and web filtering through cutting-edge technologies packaged within one agent accessible from a unified control. Progent's security and virtualization experts can help your business to design and implement a ProSight ESP deployment that addresses your organization's specific needs and that allows you achieve and demonstrate compliance with government and industry data protection standards. Progent will help you specify and configure security policies that ProSight ESP will enforce, and Progent will monitor your network and react to alerts that require immediate attention. Progent's consultants can also assist you to install and test a backup and disaster recovery solution such as ProSight Data Protection Services (DPS) so you can recover quickly from a destructive cyber attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Microsoft Exchange email filtering.
ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services from Progent provide small and mid-sized organizations a low cost and fully managed solution for reliable backup/disaster recovery. For a fixed monthly cost, ProSight Data Protection Services automates your backup processes and allows rapid recovery of vital files, applications and virtual machines that have become lost or damaged due to hardware failures, software glitches, natural disasters, human error, or malicious attacks such as ransomware. ProSight DPS can help you protect, recover and restore files, folders, applications, system images/, as well as Hyper-V and VMware virtual machine images/. Important data can be backed up on the cloud, to a local device, or to both. Progent's backup and recovery consultants can provide advanced expertise to configure ProSight DPS to be compliant with government and industry regulatory requirements like HIPPA, FIRPA, PCI and Safe Harbor and, whenever necessary, can assist you to restore your critical data. Find out more about ProSight DPS Managed Backup and Recovery.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the technology of top information security vendors to provide web-based management and world-class protection for your inbound and outbound email. The powerful architecture of Email Guard managed service integrates cloud-based filtering with an on-premises security gateway device to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based threats. The cloud filter acts as a preliminary barricade and blocks most unwanted email from making it to your network firewall. This decreases your exposure to inbound threats and conserves system bandwidth and storage space. Email Guard's on-premises gateway appliance adds a further level of analysis for inbound email. For outgoing email, the local gateway offers AV and anti-spam protection, DLP, and email encryption. The local gateway can also help Exchange Server to track and safeguard internal email traffic that originates and ends inside your security perimeter. For more information, see Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and apps hosted in a protected Tier III data center on a high-performance virtual machine host configured and maintained by Progent's network support professionals. Under the ProSight Virtual Hosting model, the customer retains ownership of the data, the operating system software, and the applications. Since the environment is virtualized, it can be moved easily to a different hardware solution without requiring a time-consuming and difficult configuration process. With ProSight Virtual Hosting, your business is not tied a single hosting service. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, update, retrieve and safeguard information related to your IT infrastructure, procedures, business apps, and services. You can quickly locate passwords or serial numbers and be warned automatically about upcoming expirations of SSLs or domains. By updating and organizing your IT infrastructure documentation, you can eliminate up to 50% of time spent looking for vital information about your IT network. ProSight IT Asset Management includes a common location for storing and collaborating on all documents related to managing your business network like standard operating procedures and How-To's. ProSight IT Asset Management also offers a high level of automation for gathering and associating IT information. Whether youíre making enhancements, performing regular maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the information you need when you need it. Find out more details about ProSight IT Asset Management service.
Expert Security Consulting
Every business should develop a carefully thought out security strategy that includes both pre-attack procedures and response plans. The proactive strategy is a set of procedures that help to reduce vulnerabilities. The reactive plan helps your company's IT security personnel to evaluate the damage resulting from a security penetration, repair the system, record the experience, and get business functions restored as rapidly as possible.
Progent's certified IS security engineers are available to help you to run a complete vulnerability evaluation and create a company-wide security plan to implement security processes and controls to reduce ongoing assaults and threats.
CISM Certified Security Engineering Services
The CISM committee describes the basic capabilities and worldwide standards of skill that IT security professionals are expected to learn. CISM provides executive management the confidence that those who have earned their CISM credential possess the experience and capability to provide effective security management and support services. Progent can provide the expertise of CISM certified security professionals to assist companies with:
Read additional details concerning Progent's CISM Accredited Security Support Services.
- Network Security Governance
- Risk Management
- Network Security Program Management
- Information Security Administration
- Response Management
CISSP Certified Security Engineering Assistance
CISSP certification denotes expertise with an international standard for data security. The American National Standards Institute has granted certification accreditation in the field of data protection under ISO/IEC 17024. Progent can provide the services of security experts who have earned CISSP certification. Progent can provide a CISSP-certified professional to help your organization in a variety security fields including:
Learn more details concerning Progent's CISSP-certified Network Security Support Services.
- Security Administration Procedures
- Security Infrastructure and Paradigms
- Access Control Solutions and Processes
- Software Development Security
- Secure Operations
- Site Security
- Encryption/Decryption Mechanisms
- Telecom, LAN and WAN Security
- Disaster Recovery Preparedness
CISSP-ISSAP Certified Secure Information System Architecture Engineering Services
Progent's CISSP-ISSAP qualified network architecture engineers are experts who have earned ISSAP Certification as a result of thorough testing and extensive experience with information security design. The ISSAP credential represents proven mastery in the most challenging requirements of IS security architecture within the broader field of IS security knowledge needed for CISSP accreditation. Progent's ISSAP-certified security specialists can help your company with all aspects of secure network architecture including.
Learn more details about Progent's ISSAP Accredited Secure IT Architecture Support Professionals.
- Access Control Mechanisms and Methodologies
- Telecommunications and Network Security
- Cryptography Solutions
- Requirements Analysis and Security Criteria
- BCP and Disaster Recovery Planning (DRP)
- Physical Security
CISA Accredited Network Security Auditing Engineering Support
The Certified Information Systems Auditor accreditation is an important qualification that indicates mastery in information system security auditing. Accredited by the American National Standards Institute (ANSI), the CISA credential has consultants pass a comprehensive test administered by the ISACA international professional group. Progent's CISA-certified IS security audit engineers can help your IT organization with:
Read the details concerning Progent's CISA Qualified Network Security Auditing Consulting Services.
- IS Audit Process
- Information Technology Governance
- Network Assets and Architecture Lifecycle Planning
- Information Technology Support
- Safeguarding Information Resources
- Disaster Recovery Planning
Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to validate an IT professional's ability to design, implement, and support information system control mechanisms to mitigate risk. Progent offers the expertise of a CRISC-certified engineer to assist you to develop and carry out a workplace continuity strategy that follows industry best practices identified by CRISC and crafted to match your organization's risk appetite, business goals, and IT budget. Progent's CRISC-qualified network risk mitigation engineers can provide a variety of risk assessment services including:
Find out additional details concerning Progent's CRISC Risk Management Experts.
- Gather data and study documentation to evaluate major risk scenarios
- Identify statutory, regulatory, and business mandates and company policies associated with your information system to assess their potential impact on your business objectives
- Point out possible vulnerabilities for your business workflows to assist in analyzing your corporate risk
- Develop a risk awareness program and provide training to ensure your stakeholders understand information system risk so they can contribute to your risk control process
- Match identified risk scenarios to your associated operational processes to help assign risk ownership
- Determine risk appetite with executive leadership and major stakeholders to make sure they match
GIAC Accredited Network Security Consulting Services
Read additional information concerning Progent's GIAC Information Assurance Expertise.
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the knowledge of network security engineers. GIAC's goal is to assure that a certified professional possesses the knowledge necessary to deliver services in vital categories of system, data, and application program security. GIAC certifications are acknowledged by businesses and government organizations all over the world including and the United States National Security Agency (NSA). Progent's GIAC-certified security audit consultants can help your company with:
Get in Touch with a Progent Security Specialist
To see how to get in touch with a certified Progent security consultant for online or on-premises support in Connecticut, phone 1-800-993-9400 or go to Online Computer Help.