Atlanta, GA Metro Area Contact Information:

City Street Address Contact Information
Atlanta, GA 260 Peachtree Street NW
Suite 2200
Atlanta, Georgia, 30303
Sales Phone: 404-537-1318

Link: Atlanta Network Support Services
Sandy Springs, GA One Glenlake Parkway
Suite 650 & 700
Atlanta, Georgia, 30328
Sales Phone: 678-899-6420

Link: Georgia Network Support Services

For immediate online assistance with data security issues, companies in Atlanta, GA, can find world-class troubleshooting by contacting Progent's certified security engineers. Progent's online service consultants are available to provide efficient and economical assistance with security crises that are impacting the productivity of your IT network. Progent's accredited security engineers are certified to provide help for environments based on Microsoft Windows, Linux, macOS and OS X, Solaris, and major versions of UNIX. Progent's broad selection of services encompasses firewall technology, email filtering and encryption, secure network design, and disaster recovery planning. Progent's technical support staff has earned the world's most advanced security accreditations including CISM and Information System Security Architecture Professional.

Progent provides online security support on a per-minute model with no minimum minutes and no extra charges for sign-up or off-hour support. By billing by the minute and by delivering top-level help, Progent's pricing policy keeps costs low and avoids situations where simple solutions result in major bills.

We've Been Hacked: What Can We Do Now?
Cybersecurity ConsultantsIf your network is now experiencing a security emergency, go to Progent's Urgent Online Technical Help to find out how to receive immediate assistance. Progent maintains a pool of veteran cybersecurity specialists who offer online and on-premises assistance that includes containment, mitigation, restoration, forensics, and hardening of your security profile to guard against future attacks.

For companies that have planned beforehand for an attack, the formal post-attack response procedure outlined by Global Information Assurance Certification is Progent's recommended method of reacting to a serious security incident.

Introduction to Security Services
Coordinating computer security and preparation for restoring vital information and systems after an attack demands a continual effort that entails an array of technologies and processes. Progent's security engineers can help your business at all levels in your efforts to guard your IT system, ranging from security evaluation to designing a complete security strategy. Key areas supported by Progent's security consultants include Security Planning and Prevention, Information Restoration and Security Failure Analysis, and Outsourced Filtering of E-mail-Borne Threats.

Designing and Implementing Secure Environments
Every company ought to have a carefully considered security plan that incorporates both proactive and reactive elements. The proactive plan is a set of steps that works to reduce security gaps. The post-attack strategy specifies procedures to assist security personnel to inventory the losses resulting from an attack, repair the damage, document the experience, and revive network activity as quickly as feasible. Progent can show you how to design protection into your company operations. Progent can set up scanning utilities, create and build a safe IT architecture, and recommend procedures and policies that will optimize the protection of your computing environment. Progent's security professionals are available to assist you to configure a firewall, design secure remote access to email and data, and configure an effective virtual private network.

If your company is looking for an economical way for outsourcing your network security administration, Progent's Round-the-clock Monitoring Services feature continual remote network tracking and immediate response to emergencies.

Hybrid Cloud Solutions
Progent can help your company you to plan, deploy, administer and repair enterprise hybrid cloud solutions that combine local and cloud resources and that comply with government security standards. (Find out about Progent's Office 365 Exchange Online integration with on-premises Exchange, Microsoft Azure enterprise hybrid cloud integration and Progent's Amazon Web Services enterprise hybrid cloud solutions.)

System Restoration and Security Forensics
Progent provides skill in recovering networks and computers that have been hacked, are suspect, or have failed because of a security breach. Progent can show you how to determine the damage caused by the attack, restore normal business operations, and recover information compromised owing to the assault. Progent's certified engineers can also perform a thorough forensic evaluation by going over activity logs and using a variety of advanced forensics techniques. Progent's experience with security consulting minimizes your downtime and allows Progent to recommend efficient strategies to prevent or contain new attacks.

Progent's Flat-rate Managed Services for Information Security
Progent's value-priced ProSight portfolio of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. Managed services offered by Progent include:

ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) solution that incorporates cutting edge behavior analysis tools to guard endpoint devices and physical and virtual servers against new malware assaults like ransomware and file-less exploits, which easily get by traditional signature-matching AV products. ProSight Active Security Monitoring protects local and cloud-based resources and provides a single platform to automate the entire threat lifecycle including protection, identification, mitigation, cleanup, and forensics. Top capabilities include one-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.

ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection services offer economical multi-layer security for physical and virtual servers, desktops, smartphones, and Microsoft Exchange. ProSight ESP uses contextual security and modern behavior analysis for continuously monitoring and reacting to security assaults from all vectors. ProSight ESP provides firewall protection, intrusion alerts, device management, and web filtering via cutting-edge technologies packaged within one agent accessible from a unified control. Progent's data protection and virtualization consultants can help your business to design and implement a ProSight ESP environment that addresses your company's unique requirements and that helps you demonstrate compliance with legal and industry data security standards. Progent will assist you specify and configure policies that ProSight ESP will enforce, and Progent will monitor your network and react to alerts that require immediate attention. Progent can also help you to set up and verify a backup and restore system like ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous security attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified endpoint security and Microsoft Exchange filtering.

ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services from Progent offer small and medium-sized businesses an affordable and fully managed service for secure backup/disaster recovery. Available at a fixed monthly cost, ProSight DPS automates your backup activities and allows rapid recovery of vital files, apps and virtual machines that have become lost or corrupted due to hardware failures, software glitches, disasters, human error, or malware attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware images. Important data can be backed up on the cloud, to an on-promises storage device, or to both. Progent's cloud backup specialists can provide advanced expertise to set up ProSight Data Protection Services to to comply with government and industry regulatory standards like HIPPA, FIRPA, and PCI and, when needed, can help you to recover your critical information. Find out more about ProSight Data Protection Services Managed Cloud Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that uses the infrastructure of leading data security vendors to deliver centralized control and world-class protection for your email traffic. The hybrid architecture of Progent's Email Guard managed service combines a Cloud Protection Layer with an on-premises gateway appliance to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based threats. The cloud filter serves as a first line of defense and keeps most unwanted email from making it to your security perimeter. This reduces your vulnerability to inbound attacks and conserves system bandwidth and storage. Email Guard's onsite gateway appliance provides a deeper layer of analysis for incoming email. For outbound email, the onsite security gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The local security gateway can also help Exchange Server to monitor and safeguard internal email that stays inside your security perimeter. For more details, visit ProSight Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its key servers and apps hosted in a protected Tier III data center on a high-performance virtual host set up and managed by Progent's IT support professionals. With Progent's ProSight Virtual Hosting service model, the client retains ownership of the data, the operating system platforms, and the applications. Because the environment is virtualized, it can be moved immediately to a different hardware solution without requiring a time-consuming and technically risky reinstallation procedure. With ProSight Virtual Hosting, your business is not tied one hosting service. Find out more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, maintain, find and protect information related to your IT infrastructure, processes, business apps, and services. You can instantly find passwords or serial numbers and be warned automatically about impending expirations of SSL certificates or domains. By updating and managing your network documentation, you can save as much as half of time spent looking for critical information about your network. ProSight IT Asset Management features a centralized location for storing and collaborating on all documents required for managing your business network like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports a high level of automation for gathering and associating IT data. Whether you’re making enhancements, performing maintenance, or responding to a crisis, ProSight IT Asset Management gets you the information you need the instant you need it. Find out more details about ProSight IT Asset Management service.

Special Security Services Available from Progent
Progent's seasoned consultants can provide unique consulting support in key facets of computer protection such as:

Security Vulnerability Audits and Compliance Testing
Progent provides experience with security auditing software such as Microsoft Baseline Security Analyzer and LANguard for performing a variety of comprehensive system tests to uncover possible security holes. Progent has broad skills with scanning tools and can help you to analyze audit reports and respond appropriately. Progent's certified security engineers also can perform web software testing and can perform thorough evaluation of corporate-wide security to assess your company's compliance with key global security standards such as HIPAA, PCI, and ISO. Also, Progent can assess the strength of your wireless security including stationary wireless appliances plus portable handsets. Get the details about Progent's Vulnerability Audits and Compliance Testing.

Cisco Security, PIX Firewall and ASA Firewall, VPN, Aironet and Meraki Wi-Fi Help
Progent's Cisco Certified Internetwork Experts and Cisco Certified Network Professionals can deliver in-depth technical services for Cisco's entire range of protection and VPN solutions including PIX 500 Series Firewalls and ASA 5500 Firewalls, Catalyst Firewall Services Module (FWSM), protected broadband and integrated services (IS) routers, wireless access points and bridges, Meraki cloud-managed Wi-Fi access points, and Catalyst Series switches. Learn additional information concerning Cisco Security, Virtual Private Network and Aironet Wireless Expertise.

Additional Firewall and VPN Solutions
In addition to supporting a broad array of security technologies available from Microsoft and Cisco, Progent offers companies of all sizes expert consulting for security products from other major firewall and Virtual Private Network suppliers. Progent's consultants offer:

Unannounced Penetration Checking Services
Stealth penetration checking is a key technique for allowing businesses to determine how exposed their networks are to real-world attacks by showing how effectively corporate protection policies and mechanisms hold up against authorized but unpublicized intrusion attempts launched by seasoned security engineers using the latest hacking techniques. Find out the details about Progent's Penetration Testing Services.

Certified Information Security Manager Security Consulting Expertise
Certified Information Security Manager Engineers for Atlanta, GeorgiaCertified Information Security Manager (CISM) defines the core skills and worldwide standards of service that information security managers are required to master. It provides executive management the confidence that consultants who have been awarded their certification have the experience and knowledge to offer effective security management and consulting support. Progent can offer a CISM-certified expert to help your enterprise in key security areas including data protection governance, vulnerability assessment, information security program control, and crisis response support.

Get the details concerning Progent's Certified Information Security Manager (CISM) Security Consulting Expertise.

Certified Information Systems Security Professionals (CISSP) Security Consulting Services
CISSP Certified System Security Engineers for Atlanta, GeorgiaProgent's Certified Information Systems Security Professionals (CISSPs) are security specialists who have been awarded CISSP status through demonstrated experience, rigorous study, and formal examination. CISSP qualification indicates expertise in an international standard for IT security. American National Standards Institute has granted the CISSP status accreditation in the field of IT security under ISO/IEC 17024. Fields of expertise included under CISSP include security management procedures, security design and test systems, access control methodology, software development security, operations security, hardware security, cryptography, communications, network security, and business continuity planning.

Find out more information about Progent's Certified Information Systems Security Professionals (CISSP) Support Expertise.

CISSP-ISSAP Certified Consultants for Secure System Infrastructure
CISSP Information Systems Security Architecture Professionals for Atlanta, GeorgiaProgent's ISSAP qualified security experts have earned ISSAP certification after rigorous examination and substantial hands-on work with network security architecture. ISSAP consultants have in-depth understanding of access control mechanisms and techniques, telecommunications and network security, cryptography, requirements analysis, business continuity planning (BCP) and disaster recovery, and physical security. Progent's ISSAP-certified security specialists can help your business with all phases of secure network architecture.

Find out more information concerning Progent's ISSAP Certified Secure Network Architecture Engineering Support.

CISSP-ISSEP Qualified Cybersecurity Engineering Consultants
CISSP-ISSEP certified Cybersecurity ConsultantsNetwork Security consultants with CISSP-ISSEP (Information Systems Security Engineering Professional) certification have proven their ability to provide large organizations with the expertise associated with a senior systems engineer, information assurance systems engineer, information assurance officer, information assurance analyst, or senior cybersecurity analyst. Progent offers the support of a certified CISSP-ISSEP network security consultant to assist your organization to follow modern system security engineering principles and processes in system development, review and evaluate system security designs according to cybersecurity engineering leading practices, produce cohesive system designs that incorporate compliant cybersecurity mechanisms for all key system functions, define effective configuration strategies to deliver protection for operations, perform in-depth risk analysis, and recommend practical cybersecurity models that balance your operational requirements with your organization's tolerance for risk.

Learn the details about Progent's CISSP-ISSEP Network Security Engineering Consulting Services.

Certified Information Systems Auditor (CISA) Consulting Expertise
CISA Cybersecurity Auditor Consultants for Atlanta, GeorgiaThe Certified Information Systems Auditor accreditation is a globally recognized achievement that represents mastery in IS security auditing. Certified by ANSI, the CISA accreditation requires that consultants undergo a comprehensive examination administered by the ISACA international professional group. Progent offers the expertise of a CISA-certified security professional able to assist businesses in the areas of IS audit services, IT governance, network assets and architecture planned useful life, IT service delivery, safeguarding information resources, and business continuity preparedness.

Find out additional details about Progent's Certified Information Systems Auditor (CISA) Professional Expertise.

CRISC-certified IT Risk Mitigation Specialists
CRISC-certified Network Risk Consultants for Atlanta, GeorgiaThe Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA to validate an IT professional's ability to design, implement, and support IS control mechanisms to mitigate network risk. Progent offers the services of a CRISC-certified engineer to help your company to develop and carry out a workplace continuity or disaster recovery plan that follows industry best practices identified by CRISC and geared to match your company's risk appetite, business objectives, and IT budget. Progent's network risk management expertise is a good fit the support provided by Progent's CISA-qualified security engineers for impartially evaluating your IS control design and with the expertise of Progent's CISM-certified support professionals for designing security policies and procedures.

Learn additional information about Progent's CRISC-certified Risk Mitigation Services.

Global Information Assurance Certification Professional Services
Network Security Consultants with Global Information Assurance Certification for Atlanta, GeorgiaGIAC (Global Information Assurance Certification) was established in 1999 to certify the knowledge of IT security engineers. GIAC's mission is to assure that a certified security consultant has the knowledge appropriate to deliver support in key areas of network, information, and software security. GIAC accreditations are acknowledged by businesses and institutions all over the world including United States National Security Agency (NSA). Progent can provide the assistance of certified consultants for any of the security disciplines covered within GIAC certification topics such as assessing security systems, incident handling, traffic analysis, web-based services security, and security information and event management (SIEM) solutions.

Learn additional details concerning Progent's GIAC Information Assurance Services.

Contact Progent for Network Security Consulting Services
If your organization is located in Atlanta or elsewhere in the state of Georgia and you need cybersecurity help, phone Progent at 800-993-9400 or refer to Contact Progent.














© 2002- 2019 Progent Corporation. All rights reserved.