Business information networks in the state of New York can have fast and affordable online technical support from Progent's certified security consultants to fix urgent security issues. The cost is competitive, charges are per minute, engagement is quick, and support is unbeatable. Progent also provides help for long-term projects that demand the knowledge of seasoned security engineers with top security certifications.
If your New York company is located away from more populated metropolitan areas including New York City, Buffalo, Rochester, Yonkers, or Syracuse, the availability of local accredited security consultants is often problematic during a crisis. This can cause a drop in income for your company, upset customers, idle employees, and defocused executives. By contacting Progent, you have access to a qualified security engineer who can deliver help whenever you have to have it to get your network operating and recover your information.
Progent can assist you in all your initiatives to guard your network with services that can range from security audits to developing a comprehensive security plan. Progent offers affordable service to assist companies of any size to set up and manage protected networks based on Microsoft Windows and Cisco products and that may include computers based on UNIX, Linux, Solaris, or Apple Mac OS X platforms plus mobile clients with Apple iOS handhelds or Android or Windows Phone devices.
Progent can also assist you to outsource spam blocking and protection from e-mail-based attacks. Email Guard is Progent's email security solution that uses the technology of top information security vendors to provide web-based control and comprehensive protection for your inbound and outbound email. The powerful architecture of Progent's Email Guard managed service combines cloud-based filtering with a local gateway device to provide complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The Cloud Protection Layer serves as a first line of defense and blocks the vast majority of threats from reaching your security perimeter. This reduces your vulnerability to external threats and conserves system bandwidth and storage. ProSight Email Guard's onsite security gateway appliance adds a further layer of inspection for inbound email. For outbound email, the local security gateway offers AV and anti-spam filtering, DLP, and email encryption. The local security gateway can also help Microsoft Exchange Server to monitor and safeguard internal email that stays within your corporate firewall.
Progent's certified experts are available online or on premises to offer a range of urgent or project-based network security services such as:
If your company has an urgent requirement for computer security support, refer to Progent's Urgent Online Technical Support.
Progent's engineers can deliver world-class support in key fields of computer security including security assessment, firewalls and VPN, and advanced security planning.
System Security Assessment
Progent's expert security engineers can assess the effectiveness of your current computer security systems by performing exhaustive remote automated analysis via advanced utilities and tested procedures. Progent's skill in administering this testing saves your company money and offers an objective portrayal of gaps. The knowledge your IT organization gains can form the basis of a network protection plan that will allow your information system to run dependably and respond quickly to future risks.
Automated Network Vulnerability Evaluation
Progent provides consulting in the application of security analysis packages including Microsoft's MBSA and GFI LANguard Network Security Scanner for economically performing a variety of automatic system auditing scans to identify possible security problems. Progent has extensive experience with other network auditing tools including NMAP Port Scanner, AMAP Application Scanner, eEye Vulnerability Scanner, plus tools like Metasploit, Hydra, and Nikto. Progent can help you to make sense of audit reports and react effectively.
Progent can show you how to design security into your company processes, configure scanning software, define and implement a secure system environment, and recommend procedures to maximize the safety of your IT system. Progent's security professionals are able to show you how to set up a firewall, implement safe remote access to email and data, and install virtual private network. Find out additional information about Progent's automated security evaluation.
Security Inventory Packages for Small Companies
Progent offers two low-cost security inventory packages designed to enable small companies to receive an independent network security evaluation from an accredited security engineer. With Progent's External Security Inventory Checkup, an engineer runs an extensive test of your IT infrastructure from beyond your firewall to uncover possible weaknesses in the security profile you expose to the public. With Progent's Internal Security Inventory Checkup, a certified security professional runs a system scan from an authorized computer inside your company firewall to determine your exposure to internal threats. Both security inventory services are configured and executed from a secured external location. The process is directed by a consultant with high-level security accreditations and who produces a document that details and analyzes the data collected by the security scan and suggests cost-effective improvements if appropriate.
Network Security Penetration Testing Consulting
Stealth penetration testing is a key component of any successful IT system security strategy. Progent’s security professionals can perform thorough intrusion checks without the knowledge of your organization's in-house network support staff. Unannounced penetration checking uncovers whether current security defense systems such as intrusion incident alerts and event history analysis are properly set up and actively monitored. Learn more concerning Progent's network penetration analysis consulting.
Firewall And Virtual Private Network (VPN) Expertise
Progent's background in network security technology encompasses in-depth familiarity with leading firewalls and VPN technology offered by multiple companies including Cisco, Microsoft, and CheckPoint. Progent can provide the services of consultants who have earned key networking accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Troubleshooting
The new Cisco ASA 5500-X Series of firewalls with Firepower Services deliver significantly more performance than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new deployments. Following Cisco's acquisition of Sourcefire, the entire line of Cisco ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular network intrusion protection system (IPS). Firepower services bring powerful new capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can assist your company to maintain your legacy PIX or ASA 5500 firewalls or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your organization to design, deploy, optimize, manage and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Read more information about ASA Firewalls with Firepower integration and troubleshooting services.
Cisco Security and VPN Consulting Expertise
Cisco's security and offsite connection technology offer a comprehensive line of easy-to-administer security products to help protect your local and remote information system. Cisco's Virtual Private Network line includes switches, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's expert staff of consultants includes field-proven engineers with Cisco CCIE and CCNP certifications who are able to help your business to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that fit best with your business goals. Read more details about Progent's Engineering Expertise for Cisco Security Technology and VPN Products.
Support Services for Other Firewall and VPN Solutions
Progent offers small and mid-size organizations professional support for Intrusion Protection products and IPsec VPN technology from leading firewall and VPN security companies including Check Point Software, Juniper Networks, and Symantec. Progent can show you how to create a comprehensive security plan and select appropriate products from multiple vendors to achieve your security objectives while staying within your budget limits.
Progent's Low-Cost Managed Services for Information Assurance
Progent's value-priced ProSight portfolio of network management outsourcing services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates next generation behavior-based machine learning tools to guard endpoints and servers and VMs against modern malware attacks such as ransomware and email phishing, which routinely get by legacy signature-matching AV products. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and offers a single platform to automate the entire malware attack progression including blocking, infiltration detection, mitigation, cleanup, and post-attack forensics. Key capabilities include single-click rollback with Windows Volume Shadow Copy Service and automatic system-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection (ESP) managed services deliver economical multi-layer protection for physical and virtual servers, desktops, mobile devices, and Exchange Server. ProSight ESP uses adaptive security and advanced heuristics for continuously monitoring and responding to security assaults from all attack vectors. ProSight ESP provides firewall protection, intrusion alerts, device management, and web filtering via leading-edge tools packaged within a single agent accessible from a unified control. Progent's security and virtualization experts can help you to design and configure a ProSight ESP deployment that meets your company's unique requirements and that allows you prove compliance with legal and industry information security regulations. Progent will help you specify and implement policies that ProSight ESP will enforce, and Progent will monitor your network and react to alerts that call for urgent attention. Progent's consultants can also help you to install and verify a backup and restore solution such as ProSight Data Protection Services so you can recover rapidly from a potentially disastrous security attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection unified endpoint security and Exchange filtering.
ProSight DPS: Managed Backup
ProSight Data Protection Services from Progent offer small and mid-sized businesses an affordable end-to-end service for reliable backup/disaster recovery (BDR). For a low monthly cost, ProSight Data Protection Services automates and monitors your backup processes and enables fast restoration of critical data, applications and virtual machines that have become unavailable or damaged due to hardware failures, software bugs, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, apps, system images/, plus Hyper-V and VMware virtual machine images/. Critical data can be backed up on the cloud, to a local storage device, or to both. Progent's cloud backup consultants can provide advanced expertise to configure ProSight Data Protection Services to be compliant with government and industry regulatory requirements such as HIPPA, FINRA, and PCI and, whenever needed, can assist you to restore your business-critical information. Learn more about ProSight DPS Managed Cloud Backup and Recovery.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the infrastructure of leading data security vendors to provide centralized control and comprehensive security for all your email traffic. The hybrid architecture of Progent's Email Guard managed service combines cloud-based filtering with a local security gateway device to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. Email Guard's Cloud Protection Layer acts as a first line of defense and keeps most unwanted email from making it to your network firewall. This decreases your vulnerability to external attacks and conserves system bandwidth and storage space. Email Guard's onsite gateway appliance adds a deeper level of inspection for incoming email. For outbound email, the local security gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The local gateway can also help Microsoft Exchange Server to monitor and safeguard internal email traffic that stays inside your corporate firewall. For more information, visit ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a secure Tier III data center on a high-performance virtual host configured and managed by Progent's IT support experts. Under Progent's ProSight Virtual Hosting service model, the client retains ownership of the data, the operating system platforms, and the applications. Since the environment is virtualized, it can be ported immediately to a different hosting solution without requiring a lengthy and difficult configuration process. With ProSight Virtual Hosting, your business is not locked into a single hosting service. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, find and protect data about your IT infrastructure, procedures, business apps, and services. You can quickly find passwords or IP addresses and be warned automatically about upcoming expirations of SSL certificates ,domains or warranties. By cleaning up and managing your IT documentation, you can eliminate as much as 50% of time thrown away searching for critical information about your network. ProSight IT Asset Management features a common repository for storing and sharing all documents related to managing your business network such as recommended procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and relating IT information. Whether you’re making improvements, doing maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the knowledge you need as soon as you need it. Find out more about ProSight IT Asset Management service.
Certified Security Planning
Every company ought to have a thoroughly thought out security strategy that includes both pre-attack procedures and reaction plans. The proactive strategy is a set of mechanisms designed to reduce security weaknesses. The post-attack plan helps your company's IT security personnel to evaluate the damage caused by an attack, fix the damage, document the event, and get business functions running as rapidly as possible.
Progent's certified IT security consultants are available to help your company to run a full vulnerability evaluation and define a computer security strategy to establish security policies and controls to minimize future attacks and threats.
CISM Qualified System Security Engineering Services
The CISM organization defines the core competencies and global standards of performance that information security professionals are expected to master. It provides executive management the confidence that consultants who have qualified for their CISM credential have the experience and knowledge to deliver effective security management and support services. Progent offers the support of CISM certified security consultants to help businesses with:
Read more details concerning Progent's CISM Qualified Network Security Support Professionals.
- Information Security Governance
- Risk Analysis
- Information Security Program Management
- Information Security Management
- Response Planning
CISSP Qualified Security Consulting Services
CISSP certification recognizes expertise with a global standard for information security. ANSI (American National Standards Institute) has granted certification recognition in the area of data protection under ISO 17024. Progent can provide the services of security experts who have earned CISSP certification. Progent can provide a CISSP-certified consultant to help your organization in a variety security fields such as:
Find out additional details about Progent's CISSP Network Security Consulting Services.
- Security Administration Practices
- Security Architecture and Paradigms
- Access Management Solutions and Methodology
- Applications Development Security
- Secure Operations
- Site Security
- Data Encryption Technology
- Telecom, Network and Internet Security
- Disaster Recovery Preparedness
CISSP-ISSAP Certified Secure IT Architecture Engineering Support
Progent's CISSP-ISSAP qualified information system architecture engineers are consultants who have been awarded ISSAP status through rigorous examination and extensive experience with information security architecture. The ISSAP credential represents demonstrated skill in the most in-depth requirements of IS security architecture bounded by the broader field of information security expertise needed for CISSP accreditation. Progent's ISSAP-qualified security specialists can assist your company with all phases of secure network architecture including.
Find out additional information about Progent's ISSAP Certified Secure Information System Architecture Engineering Services.
- Access Management Systems and Techniques
- Telecom and Network Infrastructure Security
- Encryption/Decryption Solutions
- Needs Evaluation and Security Standards
- Business Continuity Planning and Disaster Recovery Planning (DRP)
- Site Security
CISA Qualified Security Auditing Consulting Services
The Certified Information Systems Auditor (CISA) accreditation is a globally recognized achievement that represents mastery in network security audit and control. Certified by the American National Standards Institute, the CISA accreditation has candidates undergo a comprehensive examination given by the ISACA international professional association. Progent's CISA IS security audit specialists can assist your company with:
Learn the details concerning Progent's CISA Accredited Information System Security Auditing Engineering Support.
- IS Audit Services
- Information Technology Administration
- Systems and Architecture Planned Useful Life
- IT Support
- Safeguarding Information Resources
- Disaster Recovery Planning
Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA to verify a consultant's skills to plan, implement, and maintain information system control mechanisms to mitigate risk. Progent offers the services of a CRISC-certified engineer to help you to develop and execute a workplace continuity or disaster recovery strategy based on leading practices identified by CRISC and geared to match your company's risk appetite, business objectives, and IT budget. Progent's CRISC-qualified IT risk mitigation engineers can provide a variety of risk assessment services including:
Learn the details about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.
- Collect data and study documentation to help identify significant risk scenarios
- Inventory legal, regulatory, and contractual mandates and organizational policies associated with your network to assess their potential influence on your business objectives
- Identify possible vulnerabilities for your operational workflows to help in evaluating your corporate risk
- Develop a risk awareness program and conduct seminars to ensure your organization appreciate information system risk so they can contribute to your risk management process
- Connect identified risk scenarios to related operational procedures to help assign risk ownership
- Determine risk tolerance with executive management and key stakeholders to ensure they align
GIAC Certified Security Consulting Services
Read more information about Progent's GIAC Information Assurance Expertise.
GIAC (Global Information Assurance Certification) was established in 1999 to certify the skill of information technology security professionals. GIAC's mission is to verify that an accredited professional possesses the knowledge appropriate to deliver support in critical categories of network, information, and application security. GIAC accreditations are recognized by companies and institutions all over the world including and the U.S. National Security Agency (NSA). Progent's GIAC-certified security audit experts can help your IT organization with:
Get in Touch with a Security Expert
To see how to contact a Progent security engineer for online or on-premises help in New York, phone 1-800-993-9400 or go to Remote Computer Help.