Business computer networks in the state of Connecticut can have quick and economical online help from Progent's qualified security professionals to assist with complex security issues. The cost is affordable, billing is per minute, sign-up is immediate, and support is unbeatable. Progent also offers assistance for long-term projects that demand the services of senior security engineers with high-level industry certifications.
If your Connecticut organization is situated away from major urban areas like Bridgeport, New Haven, Hartford, or Stamford, support from nearby certified network security consultants may be limited during a security disaster. This can cause lost income for your company, upset clients, idle employees, and distracted management. By calling Progent, you can get in touch with a certified security engineer ready to deliver assistance when you need it to get your computer network running and restore your information.
Progent can assist you in all your initiatives to guard your information system with services ranging from security assessments to developing a comprehensive security strategy. Progent provides economical service to assist companies of any size to design and manage secure IT environments based on Microsoft Windows and Cisco products and that may include servers and desktops based on UNIX or Linux platforms plus mobile clients with Apple handhelds or Android or Windows Phone handsets.
Progent can also help you outsource spam blocking and protection from e-mail-based attacks. Email Guard is Progent's email security solution that uses the technology of leading information security companies to provide web-based control and comprehensive protection for all your inbound and outbound email. The powerful architecture of Progent's Email Guard integrates cloud-based filtering with a local security gateway device to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based threats. The cloud filter acts as a preliminary barricade and keeps most threats from reaching your network firewall. This reduces your vulnerability to external attacks and saves network bandwidth and storage space. ProSight Email Guard's on-premises gateway device provides a deeper layer of analysis for inbound email. For outgoing email, the local gateway offers AV and anti-spam protection, DLP, and encryption. The local security gateway can also help Exchange Server to monitor and protect internal email that originates and ends inside your corporate firewall.
Progent's security experts are accessible online or on site to provide a range of urgent or longer-term computer security services such as:
If your network has an urgent requirement for IT security support, go to Progent's Urgent Remote Network Support.
- Perform comprehensive security evaluations
- Clean up quickly after serious security breaches
- Install effective firewalls
- Configure safe methods for remote and mobile connectivity
- Deploy effective utilities for protection against viruses, spam and DHAs
- Develop a company-wide security strategy with proactive monitoring
- Provide comprehensive Call Center Services
- Create a practical data backup and restore strategy built around Data Protection Manager backup/restore technology
Progent's security experts offer advanced services in key fields of system protection that include analysis, firewall and VPN solutions, and advanced security planning.
System Security Audits
Progent's certified security engineers can evaluate the effectiveness of your current network protection implementation through comprehensive remote automated analysis based on sophisticated software tools and tested procedures. Progent's skill in administering this testing saves you money and offers a detailed portrayal of weaknesses. The information your company gains can form the basis of a security strategy that will allow your network to operate dependably and adapt rapidly to new threats.
Automated Network Security Evaluation
Progent provides consulting in the use of security evaluation utilities such as Microsoft's MBSA and GFI LANguard Network Security Scanner for affordably running a variety of programmed system auditing scans to identify potential security problems. Progent has extensive experience with additional network analysis utilities such as NMAP, AMAP application mapper, eEye Vulnerability Scanner, as well as utilities like Metasploit Framework, Netcat, Socat, and Nikto. Progent can show you how to make sense of testing reports and react effectively.
Progent can help you build security into your company operations, install scanning tools, plan and implement a secure network architecture, and recommend procedures to optimize the security of your IT system. Progent's security engineers are ready to help you configure a firewall, implement secure remote connectivity to email and data, and install virtual private network. Find out more about Progent's network security evaluation.
Security Inventory and Evaluation Packages for Small Businesses
Progent has put together two low-cost security inventory and evaluation packages designed to enable small companies to receive an independent network security evaluation from a qualified security specialist. With Progent's External Network Security Inventory Scan, a security engineer administers an extensive test of your network from outside your firewall to uncover possible weaknesses in the security posture you present to the public. With Progent's Internal Security Inventory Scan, an engineer runs a system scan from an authorized computer within your company firewall to assess your exposure to inside assaults. The two security inventory packages are configured and run from a protected remote site. The project is overseen by an engineer who has earned top security credentials and who generates a report that details and analyzes the information collected by the security scan and suggests cost-effective remediation if called for.
Network Intrusion Analysis Support Services
Stealth penetration testing is a key component of any comprehensive network security plan. Progent’s security experts can perform extensive penetration tests without the knowledge of your organization's in-house network support resources. Stealth penetration testing shows whether existing security defense tools such as intrusion detection warnings and event log monitoring are correctly set up and actively monitored. Find out more about Progent's network penetration analysis consulting.
Firewall And Virtual Private Network (VPN) Expertise
Progent's background in network security solutions encompasses extensive familiarity with major firewalls and Virtual Private Network (VPN) technology from multiple companies such as Cisco, Microsoft, and Symantec. Progent offers the services of consultants who have earned key industry certifications including CCIE and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Troubleshooting
The latest generation of ASA 5500-X Series of firewalls with Firepower Services offer significantly more bang for the buck than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new deployments. After Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X devices can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the world's most deployed intrusion protection system. Firepower services bring enhanced features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network consultants can help you to maintain your current PIX or ASA 5500 security appliances or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite help with ASA 5500-X firewalls with Firepower Services and can help your company to plan, deploy, tune, administer and debug firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. See additional information about Cisco ASA 5500-X Firewalls with Firepower Services configuration and debugging support.
Cisco Network Security and Virtual Private Network Support Expertise
Cisco's network security and offsite access technology represent a comprehensive line of easy-to-administer security products to help protect your wired and wireless information system. Cisco's VPN line features routers, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's expert consulting staff includes experienced specialists with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional certifications who can help your company to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that fit best with your company goals. Find out additional details about Progent's Engineering Services for Cisco Security and VPN Products.
Engineering Services for Additional Firewall and VPN Technology
Progent provides small and medium size organizations professional support for Intrusion Protection Systems and IPsec VPN products from leading firewall and Virtual Private Network security vendors such as WatchGuard, Juniper Networks, and Symantec. Progent can help you create a comprehensive security plan and select appropriate products from multiple suppliers to achieve your security goals while sticking within your budget restraints.
Progent's Low-Cost Managed Services for Information Security
Progent's value-priced ProSight line of network monitoring and management services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services offered by Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection service that utilizes cutting edge behavior analysis technology to guard endpoint devices and servers and VMs against modern malware attacks such as ransomware and file-less exploits, which routinely escape traditional signature-based AV tools. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and provides a unified platform to address the entire threat progression including blocking, detection, containment, remediation, and post-attack forensics. Top capabilities include single-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection services offer ultra-affordable in-depth protection for physical servers and virtual machines, workstations, mobile devices, and Exchange email. ProSight ESP uses contextual security and modern behavior analysis for continuously monitoring and reacting to security assaults from all vectors. ProSight ESP delivers two-way firewall protection, penetration alerts, endpoint management, and web filtering through leading-edge technologies packaged within a single agent managed from a single control. Progent's data protection and virtualization consultants can assist you to design and implement a ProSight ESP deployment that meets your company's specific requirements and that helps you prove compliance with legal and industry information security regulations. Progent will assist you define and implement policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alarms that call for urgent attention. Progent's consultants can also help your company to install and test a backup and restore system like ProSight Data Protection Services (DPS) so you can get back in business quickly from a destructive cyber attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified endpoint security and Microsoft Exchange filtering.
ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services from Progent provide small and mid-sized organizations a low cost and fully managed solution for secure backup/disaster recovery (BDR). For a low monthly price, ProSight Data Protection Services automates and monitors your backup activities and enables fast restoration of vital files, applications and VMs that have become lost or corrupted due to component failures, software glitches, natural disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, apps, system images/, plus Hyper-V and VMware images/. Important data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's cloud backup specialists can provide world-class expertise to set up ProSight DPS to to comply with government and industry regulatory requirements such as HIPPA, FIRPA, and PCI and, whenever needed, can assist you to recover your critical data. Find out more about ProSight Data Protection Services Managed Cloud Backup and Recovery.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the infrastructure of leading information security companies to provide centralized management and comprehensive security for all your email traffic. The hybrid structure of Progent's Email Guard managed service combines a Cloud Protection Layer with a local security gateway appliance to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based malware. The cloud filter serves as a first line of defense and keeps most unwanted email from reaching your security perimeter. This reduces your exposure to external threats and conserves network bandwidth and storage space. Email Guard's on-premises gateway device provides a further level of analysis for incoming email. For outgoing email, the local security gateway provides AV and anti-spam filtering, DLP, and email encryption. The local security gateway can also assist Microsoft Exchange Server to monitor and protect internal email that originates and ends within your corporate firewall. For more information, visit Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and applications hosted in a protected Tier III data center on a fast virtual host configured and maintained by Progent's IT support professionals. Under Progent's ProSight Virtual Hosting service model, the client retains ownership of the data, the operating system software, and the apps. Since the environment is virtualized, it can be ported immediately to an alternate hardware environment without requiring a lengthy and difficult configuration procedure. With ProSight Virtual Hosting, you are not locked into a single hosting provider. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, retrieve and safeguard data about your IT infrastructure, processes, business apps, and services. You can instantly locate passwords or IP addresses and be warned about impending expirations of SSL certificates or warranties. By updating and managing your IT infrastructure documentation, you can eliminate up to half of time wasted looking for vital information about your network. ProSight IT Asset Management includes a common location for holding and collaborating on all documents related to managing your business network like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT data. Whether you’re making improvements, doing maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the data you require when you need it. Learn more about ProSight IT Asset Management service.
Certified Network Security Design
Every company should develop a carefully thought out security program that incorporates both proactive procedures and response planning. The proactive plan is a set of mechanisms intended to reduce vulnerabilities. The reactive plan helps your company's security engineers to evaluate the damage resulting from an attack, fix the network, record the event, and get business functions running as rapidly as possible.
Progent's certified information security engineers can to assist your company to run a complete vulnerability assessment and create a company-wide security strategy to implement security processes and mechanisms to mitigate ongoing attacks and threats.
CISM Accredited Security Engineering Expertise
The CISM organization describes the core competencies and global standards of performance that IT security professionals are expected to learn. It provides executive management the confidence that consultants who have qualified for their CISM credential have the background and knowledge to deliver efficient security administration and consulting consulting. Progent offers the services of CISM certified security consultants to assist businesses with:
Find out additional details about Progent's CISM Security Support Expertise.
- IS Security Processes
- Risk Analysis
- Information Security Implementation Management
- Information Security Management
- Response Management
CISSP Qualified Security Engineering Expertise
CISSP certification denotes mastery of an international standard for data security. The American National Standards Institute has granted the CISSP credential accreditation in the area of data security under ISO 17024. Progent can provide access to of security consultants who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified consultant to help your enterprise in a variety security areas including:
Learn additional information concerning Progent's CISSP-certified Security Consulting Services.
- Security Management Procedures
- Security Architecture and Paradigms
- Access Management Solutions and Processes
- Software Development Security
- Operations Security
- Physical Security
- Cryptography Technology
- Telecommunications, Network and WAN Security
- Disaster Recovery Preparedness
CISSP-ISSAP Accredited Secure IT Architecture Consulting Expertise
Progent's CISSP-ISSAP qualified information system architecture engineers are consultants who have earned ISSAP Certification through rigorous examination and significant experience with information security architecture. The ISSAP credential indicates proven mastery in the most challenging requirements of IS security architecture within the wider field of IS security expertise required for CISSP accreditation. Progent's ISSAP-certified security consultants can assist your business with all phases of architecture security such as.
Read additional details about Progent's ISSAP Certified Secure Information System Architecture Consulting Professionals.
- Access Management Systems and Methodologies
- Telecom and System Infrastructure Security
- Data Encryption Options
- Needs Analysis and Security Criteria
- BCP and DRP
- Physical Security
CISA Accredited Information System Security Auditing Engineering Expertise
The Certified Information Systems Auditor accreditation is an important achievement that represents expertise in information system security audit and control. Certified by the American National Standards Institute, the CISA accreditation has candidates undergo an extensive test given by the ISACA international professional group. Progent's CISA IS security audit experts can help your company in the areas of:
Learn more information concerning Progent's CISA Certified IS Security Auditing Consulting Support.
- IS Audit Services
- Information Technology Enforcement
- Systems and Architecture Lifecycle Planning
- IT Service Delivery
- Protecting Information Resources
- Business Continuity Preparedness
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA to verify a consultant's ability to design, implement, and support IS controls to mitigate network risk. Progent offers the services of a CRISC-certified consultant to assist your company to develop and carry out a workplace continuity or disaster recovery plan based on industry best practices promoted by CRISC and geared to match your company's risk appetite, business goals, and budgetary guidelines. Progent's CRISC-qualified IT risk mitigation engineers can provide a variety of risk identification services including:
Find out additional information about Progent's CRISC Risk Management Consultants.
- Collect data and review documentation to help identify major risk scenarios
- Inventory statutory, regulatory, and contractual requirements and company standards related to your information system to assess their potential influence on your business objectives
- Identify potential vulnerabilities for your operational processes to help in evaluating your enterprise risk
- Create a risk awareness initiative and provide seminars to make sure your organization appreciate information system risk so they can contribute to your risk management program
- Connect identified risk scenarios to related business processes to help assign risk ownership
- Validate risk tolerance with your senior management and major stakeholders to ensure they match
GIAC Qualified Security Consulting Assistance
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the skill of computer security engineers. GIAC's goal is to ensure that an accredited professional has the knowledge necessary to provide services in important categories of network, data, and program security. GIAC certifications are recognized by companies and government organizations throughout the world including and the U.S. National Security Agency. Progent's GIAC-qualified information security audit experts can help your business with:
Find out additional details about Progent's GIAC Information Assurance Expertise.
- Auditing Networks
- Incident Response
- Traffic Analysis
- Web-based Application Security
- SIEM solutions
Get in Touch with a Certified Progent Security Specialist
To find out how to get in touch with a Progent security engineer for online or onsite expertise in Connecticut, phone 1-800-993-9400 or visit Online Network Support.