Small business information networks in New York can have fast and economical online access to Progent's qualified security engineers to assist with complex security issues. Rates are reasonable, billing is by the minute, engagement is fast, and service is world class. Progent also offers help for long-term engagements that demand the expertise of seasoned security consultants with high-level industry credentials.
In case your New York company is situated some distance from major urban neighborhoods like New York City, Buffalo, Rochester, Yonkers, or Syracuse, support from nearby certified network security professionals may be problematic during an urgent situation. This can result in a drop in productivity for your company, upset clients, idle workers, and defocused management. By contacting Progent, you can get in touch with a certified security professional who can provide expertise whenever you require it to get your computer network on line and restore your information.
Progent can help you in all your efforts to protect your information system with services that can range from security checks to creating a company-wide security strategy. Progent provides affordable service to help companies of any size to configure and manage secure networks powered by Microsoft Windows and Cisco technology and that may include servers and desktops running UNIX or Linux operating systems plus BYOD users with Apple iOS iPhones and iPads or Android or Windows Phone handsets.
Progent can also show you how to outsource spam blocking and defense against email-borne security threats. Email Guard is Progent's email security solution that incorporates the services and infrastructure of top data security companies to provide centralized control and comprehensive protection for your inbound and outbound email. The powerful architecture of Progent's Email Guard managed service combines a Cloud Protection Layer with a local gateway appliance to offer advanced defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-based threats. ProSight Email Guard's Cloud Protection Layer serves as a preliminary barricade and blocks most unwanted email from making it to your security perimeter. This decreases your exposure to external attacks and saves system bandwidth and storage. ProSight Email Guard's on-premises gateway device provides a further level of analysis for incoming email. For outgoing email, the local gateway offers AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also help Microsoft Exchange Server to monitor and protect internal email that originates and ends within your security perimeter.
Progent's certified engineers are available online or on site to offer a variety of emergency or project-based computer security services including:
If your company has an emergency requirement for IT security support, go to Progent's Emergency Online Network Support.
Progent's security experts can deliver world-class support in key areas of system protection that include analysis, firewall and VPN expertise, and high-level security consulting.
Progent's expert security consultants can assess the vulnerability of your current network protection implementation by performing exhaustive remote automated testing based on advanced utilities and tested techniques. Progent's experience in this service saves your company time and money and assures a detailed portrayal of system vulnerability. The information your company gains can form the basis of a security plan that will allow your network to operate dependably and respond rapidly to future risks.
Automated Security Analysis
Progent provides consulting in the application of security evaluation software including Microsoft's MBSA and GFI LANguard for economically running a set of programmed system testing checks to uncover potential security holes. Progent has broad experience with other security auditing tools including NMAP Port Scanner, AMAP, eEye, as well as utilities such as Metasploit Framework, Hydra, and Nikto. Progent can show you how to understand testing reports and respond effectively.
Progent can help you build security into your business processes, configure scanning applications, define and deploy a secure network architecture, and recommend policies to maximize the security of your IT system. Progent's security professionals are available to help you set up a firewall, design secure remote connectivity to email and business applications, and install virtual private network. Learn additional information about Progent's automated security audits.
Security Inventory Packages for Small Businesses
Progent offers two low-cost security inventory and evaluation bundles intended to enable small companies to receive a professional network security assessment from a certified security consultant. With Progent's External Network Security Inventory Checkup, a security engineer administers an extensive examination of your network from beyond your company firewall to determine potential weaknesses in the security profile you present to the outside world. With Progent's Internal Network Security Inventory Checkup, a security engineer runs a network scan from an authorized computer within your firewall to evaluate vulnerabilities to inside assaults. Both security inventory packages are set up and run from a secured remote location. The project is overseen by a consultant with top security accreditations and who produces a document that details and analyzes the data captured by the scan and suggests practical improvements if called for.
Network Security Penetration Testing Consulting
Stealth intrusion checking is an important part of any comprehensive IT system security plan. Progentís security professionals can run thorough intrusion checks without the awareness of your company's in-house network support staff. Stealth penetration testing shows whether current security defense systems such as intrusion detection warnings and event log monitoring are correctly set up and consistently monitored. Find out additional information concerning Progent's stealth security penetration testing support services.
Firewall And Virtual Private Network (VPN) Solutions
Progent's expertise in security solutions encompasses extensive field work with major firewalls and Virtual Private Network (VPN) technology offered by a variety of vendors such as Cisco, Microsoft, and CheckPoint. Progent offers the services of consultants who have earned key industry accreditations such as CCIE and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Configuration and Troubleshooting
The current ASA 5500-X Series of firewalls with Firepower Services offer significantly more value than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX firewalls for all new deployments. After Cisco's purchase of Sourcefire, the whole line of ASA 5500-X devices can be configured to enable Firepower Services, built on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system. Firepower services provide powerful new capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-qualified CCIE network consultants can help you to manage your legacy PIX or ASA 5500 security appliances and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist you to design, integrate, tune, administer and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Learn additional details about Cisco ASA 5500-X Firewalls with Firepower configuration and troubleshooting support.
Cisco Security and VPN Consulting Expertise
Cisco's network security and remote connection technology offer a full range of easy-to-administer security solutions to help protect your wired and wireless information system. Cisco's Virtual Private Network product family features switches, firewalls, intrusion detection devices and VPN appliances. Progent's expert consulting staff includes field-proven specialists with Cisco's CCIE and Cisco Certified Network Professional certifications who are able to assist your business to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that fit most closely with your company objectives. Read additional details about Progent's Support Expertise for Cisco Security Solutions and Virtual Private Network Appliances.
Support Expertise for Additional Firewall and VPN Products
Progent offers small and medium size businesses professional consulting for Intrusion Protection products and IPsec VPN solutions from leading firewall and Virtual Private Network security vendors including Check Point Software, Juniper, and SonicWALL. Progent can show you how to design a comprehensive security strategy and select appropriate products from a variety of suppliers to achieve your security objectives while staying within your budget limits.
Progent's Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight family of network management outsourcing services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates cutting edge behavior analysis technology to guard endpoints and physical and virtual servers against new malware attacks such as ransomware and file-less exploits, which routinely evade legacy signature-matching anti-virus tools. ProSight ASM safeguards on-premises and cloud-based resources and provides a unified platform to automate the entire threat lifecycle including blocking, detection, containment, cleanup, and forensics. Key features include one-click rollback with Windows VSS and real-time system-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) managed services offer economical in-depth security for physical servers and virtual machines, workstations, smartphones, and Microsoft Exchange. ProSight ESP utilizes adaptive security and modern behavior analysis for round-the-clock monitoring and responding to cyber assaults from all attack vectors. ProSight ESP provides two-way firewall protection, intrusion alarms, endpoint management, and web filtering through cutting-edge tools packaged within one agent managed from a unified console. Progent's data protection and virtualization consultants can help your business to plan and implement a ProSight ESP environment that meets your organization's unique needs and that allows you achieve and demonstrate compliance with government and industry data protection regulations. Progent will assist you define and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alarms that require urgent attention. Progent's consultants can also assist your company to set up and test a backup and disaster recovery solution like ProSight Data Protection Services (DPS) so you can get back in business quickly from a destructive security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Microsoft Exchange filtering.
ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services from Progent offer small and medium-sized organizations an affordable end-to-end service for secure backup/disaster recovery. Available at a low monthly cost, ProSight DPS automates and monitors your backup processes and allows rapid restoration of vital data, apps and VMs that have become lost or damaged as a result of component failures, software bugs, natural disasters, human error, or malicious attacks like ransomware. ProSight DPS can help you protect, recover and restore files, folders, applications, system images/, as well as Hyper-V and VMware virtual machine images/. Critical data can be backed up on the cloud, to an on-promises storage device, or to both. Progent's backup and recovery consultants can provide world-class expertise to configure ProSight DPS to to comply with regulatory standards like HIPPA, FINRA, PCI and Safe Harbor and, when needed, can assist you to restore your critical information. Find out more about ProSight DPS Managed Cloud Backup and Recovery.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the infrastructure of leading information security companies to provide web-based control and world-class security for all your inbound and outbound email. The powerful structure of Email Guard integrates a Cloud Protection Layer with a local security gateway device to offer advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne threats. Email Guard's Cloud Protection Layer serves as a preliminary barricade and keeps the vast majority of threats from making it to your security perimeter. This reduces your exposure to external threats and conserves network bandwidth and storage space. Email Guard's on-premises gateway device provides a further level of inspection for incoming email. For outgoing email, the onsite gateway provides AV and anti-spam protection, protection against data leaks, and email encryption. The on-premises security gateway can also assist Exchange Server to monitor and safeguard internal email traffic that stays inside your corporate firewall. For more information, visit Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small organization can have its critical servers and apps hosted in a secure fault tolerant data center on a fast virtual machine host set up and managed by Progent's IT support experts. With the ProSight Virtual Hosting service model, the customer retains ownership of the data, the OS software, and the apps. Since the environment is virtualized, it can be moved easily to a different hardware environment without requiring a time-consuming and difficult reinstallation procedure. With ProSight Virtual Hosting, you are not tied one hosting service. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, find and protect information about your network infrastructure, processes, business apps, and services. You can quickly find passwords or serial numbers and be alerted automatically about upcoming expirations of SSLs ,domains or warranties. By updating and managing your IT documentation, you can save up to half of time thrown away trying to find vital information about your network. ProSight IT Asset Management features a centralized location for storing and sharing all documents related to managing your network infrastructure like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers advanced automation for collecting and associating IT information. Whether youíre planning improvements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the data you need the instant you need it. Find out more about Progent's ProSight IT Asset Management service.
Expert Network Security Design
Every business should develop a thoroughly considered security strategy that incorporates both proactive processes and reaction planning. The proactive strategy is a set of mechanisms designed to minimize vulnerabilities. The post-attack plan assists your company's security engineers to evaluate the damage caused by an attack, repair the network, document the event, and get business functions restored as soon as possible.
Progent's certified IS security engineers can to help you to run a full risk assessment and define a company-wide security plan to implement security processes and controls to minimize future attacks and dangers.
CISM Certified System Security Consulting Expertise
The Certified Information Security Manager (CISM) organization defines the core competencies and worldwide standards of skill that IT security managers are expected to master. CISM provides executive management the confidence that those who have earned their CISM credential possess the background and knowledge to provide efficient security management and support consulting. Progent can provide the support of CISM qualified security consultants to assist businesses with:
Learn more information about Progent's CISM Certified Network Security Engineering Expertise.
- Information Security Strategies
- Vulnerability Analysis
- Information Security Implementation Management
- Information Security Management
- Recovery Planning
CISSP Certified Security Consulting Services
CISSP recognizes mastery of a global standard for network security. ANSI (American National Standards Institute) has granted the CISSP credential accreditation in the area of data security under ISO/IEC 17024. Progent offers access to of security consultants who have qualified for CISSP certification. Progent can provide a CISSP-certified professional to help your enterprise in a variety security fields such as:
Find out more information concerning Progent's CISSP-certified Information Security Consulting Professionals.
- Security Management Procedures
- Security Infrastructure and Paradigms
- Access Control Systems and Methodology
- Applications Development Security
- Secure Operations
- Physical Security
- Encryption/Decryption Technology
- Telecommunications, LAN and Internet Security
- Business Continuity Planning
CISSP-ISSAP Accredited Secure Information System Architecture Engineering Support
Progent's CISSP-ISSAP qualified network architecture professionals are consultants who have earned ISSAP status as a result of thorough examination and significant work with network security architecture. The Information System Security Architecture Professional (ISSAP) certification indicates proven competence in the more complex requirements of information security architecture bounded by the wider field of information system security knowledge needed for CISSP certification. Progent's ISSAP-qualified security experts can help your business with all phases of architecture security including.
Learn additional information concerning Progent's ISSAP Certified Secure Network Architecture Engineering Services.
- Access Control Mechanisms and Techniques
- Phone System and Network Infrastructure Security
- Data Encryption Options
- Requirements Evaluation and Security Standards
- BCP and Disaster Recovery Planning (DRP)
- Physical Security
CISA Certified IS Security Auditing Engineering Expertise
The CISA accreditation is a recognized achievement that represents mastery in network security auditing. Accredited by the American National Standards Institute (ANSI), the CISA accreditation requires that candidates pass an extensive test administered by the ISACA international professional association. Progent's CISA-qualified information security audit specialists can help your IT organization with:
Find out the details about Progent's CISA Certified Information System Security Auditing Consulting Assistance.
- IS Audit Process
- Information Technology Enforcement
- Network Assets and Architecture Planned Useful Life
- Information Technology Service Delivery
- Safeguarding Information Resources
- Disaster Recovery Preparedness
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to verify a consultant's ability to plan, deploy, and support IS control mechanisms to reduce risk. Progent offers the services of a CRISC-certified consultant to assist your company to develop and execute a business continuity strategy that follows leading practices identified by CRISC and crafted to match your company's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC-qualified network risk management consultants offer a range of risk assessment services such as:
Learn more information concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.
- Collect data and study documentation to evaluate major risk scenarios
- Inventory legal, regulatory, and business mandates and organizational standards associated with your information system to determine their possible impact on your strategic goals
- Point out potential vulnerabilities for your operational processes to help in evaluating your enterprise risk
- Develop a risk awareness initiative and provide training to ensure your organization appreciate information system risk so they can contribute to your risk control process
- Match identified risk vectors to your associated operational procedures to help assign risk responsibility
- Validate risk appetite with your senior management and key stakeholders to ensure they match
GIAC Certified IS Security Engineering Support
Global Information Assurance Certification was established in 1999 to certify the knowledge of information technology security experts. GIAC's mission is to make sure that a certified security consultant possesses the skills necessary to provide support in key areas of system, information, and program security. GIAC certifications are acknowledged by companies and government organizations throughout the world including and the United States NSA. Progent's GIAC-qualified information security audit specialists are available to help your IT organization in the areas of:
Read more information about Progent's GIAC Information Assurance Services.
- Assessing Networks
- Incident Response
- Traffic Analysis
- Web Application Security
- SIEM solutions
Contact a Progent Security Specialist
To see how to access a security engineer for online or on-premises help in New York, call 1-800-993-9400 or visit Online Network Help.
© 2002-2019 Progent Corporation. All rights reserved.