To get immediate remote help with computer security issues, companies in Augusta-Richmond County, GA, can find world-class expertise from Progent's security engineers. Progent's remote support consultants are available to offer fast and economical help with security crises that threaten the productivity of your network. Progent's accredited engineers are qualified to support environments based on Windows, Linux, Mac OS X, Sun Solaris, and major versions of UNIX. Progent's broad array of consulting services covers firewall expertise, email filtering and encryption, protected system design, and disaster recovery planning. Progent's technical support team has been awarded the industry's top security credentials including GIAC (Global Information Assurance Certification) and Information System Security Architecture Professional (ISSAP).

Progent offers remote security support services on a per-minute basis with no minimum call duration and no extra charges for sign-up or off-hour service. By charging by the minute and by delivering top-level expertise, Progent's pricing structure keeps expenses low and eliminates situations where simple fixes entail major charges.

Our Network Has Been Attacked: What Should We Do?
If your network is now experiencing a security emergency, visit Progent's Urgent Online Network Support to find out how to get fast aid.

For businesses that have prepared carefully for a security breech, the step-by-step post-attack handling procedure promoted by GIAC (Global Information Assurance Certification) is Progent's preferred method of handling a serious security attack.

Introduction to Security Services
Coordinating data security plus preparation for recovering vital information and systems following a security breach demands an on-going program that entails an array of technologies and procedures. Progent's certified security engineers can assist your organization at all levels in your attempt to guard your IT network, ranging from security evaluation to designing a complete security plan. Key areas supported by Progent's experts include Planning and Implementation, Information Recovery and Security Failure Analysis, and Outsourced Filtering of Email-Based Spam and Viruses.

Designing and Implementing Protected Environments
Every business should have a thoroughly thought out security strategy that incorporates both proactive and reactive activity. The pre-attack plan is a set of precautions that helps to reduce vulnerabilities. The post-attack strategy specifies procedures to help security personnel to evaluate the damage caused by a breach, repair the damage, document the experience, and revive business functions as quickly as feasible. Progent can advise you how to incorporate protection into your company operations. Progent can install auditing utilities, create and implement a secure IT infrastructure, and recommend processes and policies to optimize the protection of your information system. Progent's security experts are ready to help you to set up a firewall, design protected remote connectivity to e-mail and information, and configure an efficient virtual private network.

If your company is looking for an affordable option for jobbing out your network security management, Progent's Round-the-clock Monitoring Packages include automated online network monitoring and quick resolution of emergencies.

Hybrid Cloud Solutions
Progent can assist your IT team you to design, deploy, manage and troubleshoot enterprise hybrid cloud solutions that include physical and cloud-based infrastructure and that comply with regulatory security standards. (Learn about Progent's Office 365 integration solutions with on-premises Exchange, Microsoft Azure enterprise hybrid cloud integration and Progent's Amazon Web Services enterprise hybrid cloud solutions.)

Data Restoration and Security Forensics
Progent has expertise in recovering networks and computers that have been compromised, are in question, or have stopped working following a security penetration. Progent can show you how to determine the losses caused by the attack, restore normal functions, and retrieve information lost owing to the assault. Progent's certified engineers can also perform a comprehensive forensic analysis by going over activity logs and utilizing a variety of proven assessment tools. Progent's experience with security issues reduces your downtime and permits Progent to propose effective measures to avoid or mitigate new attacks.

Progent's Flat-rate Managed Services for Information Security
Progent's value-priced ProSight line of network management outsourcing services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services offered by Progent include:

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that incorporates the technology of leading data security companies to deliver centralized control and world-class security for all your inbound and outbound email. The hybrid architecture of Progent's Email Guard combines a Cloud Protection Layer with a local gateway device to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The cloud filter serves as a first line of defense and blocks most threats from making it to your network firewall. This decreases your vulnerability to inbound attacks and conserves network bandwidth and storage. Email Guard's on-premises security gateway appliance adds a deeper layer of inspection for inbound email. For outbound email, the onsite security gateway offers AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite gateway can also assist Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends within your security perimeter. For more information, see Email Guard spam and content filtering.

ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates next generation behavior machine learning tools to defend endpoint devices as well as servers and VMs against new malware assaults such as ransomware and email phishing, which easily escape legacy signature-based AV tools. ProSight ASM protects on-premises and cloud-based resources and offers a unified platform to address the entire malware attack progression including filtering, identification, containment, cleanup, and forensics. Key features include single-click rollback using Windows Volume Shadow Copy Service and real-time network-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.

ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services provide small and medium-sized businesses a low cost end-to-end service for secure backup/disaster recovery. For a low monthly rate, ProSight DPS automates your backup activities and allows fast recovery of vital data, applications and virtual machines that have become lost or corrupted due to component failures, software bugs, disasters, human mistakes, or malware attacks like ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware images. Critical data can be protected on the cloud, to an on-promises storage device, or to both. Progent's backup and recovery consultants can provide advanced support to set up ProSight DPS to be compliant with government and industry regulatory requirements such as HIPPA, FIRPA, and PCI and, whenever necessary, can assist you to recover your business-critical information. Find out more about ProSight DPS Managed Backup.

ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, update, retrieve and safeguard data about your network infrastructure, procedures, business apps, and services. You can instantly locate passwords or IP addresses and be alerted about impending expirations of SSL certificates or domains. By updating and organizing your network documentation, you can save as much as half of time spent looking for vital information about your network. ProSight IT Asset Management includes a centralized repository for holding and sharing all documents related to managing your network infrastructure such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and associating IT information. Whether you’re making improvements, performing maintenance, or responding to an emergency, ProSight IT Asset Management delivers the data you require when you need it. Learn more details about Progent's ProSight IT Asset Management service.

Specialized Security Expertise Offered by Progent
Progent's certified security engineers offer unique expertise in key facets of network protection such as:

Security Vulnerability Audits and Security Compliance Testing
Progent provides expertise with security evaluation tools like Microsoft Baseline Security Analyzer and LANguard from GFI for conducting a variety of comprehensive network tests to uncover possible security problems. Progent has broad skills with these tools and can assist your company to analyze audit results and respond efficiently. Progent's certified security consultants also provide web software testing and can perform thorough assessments of enterprise-wide security to determine your organization's compliance with important industry security standards such as FISMA, PCI, and ISO. Also, Progent can assess the strength of your wireless protection covering in-place wireless appliances plus mobile devices. Read additional information concerning Progent's Information Risk Audits and Compliance Assessment.

Cisco Network Security, PIX Firewall and ASA Firewall, VPN, Aironet and Meraki Wireless Help
Progent's Cisco CCIE engineers and Cisco CCNP experts can provide world-class technical expertise for Cisco's entire range of security and VPN technologies such as PIX Series Firewalls and ASA 5500 Firewalls, the Catalyst FWSM, secure broadband and IS routers, Aironet wireless access points, Meraki cloud-managed APs, and Catalyst Series switches. Learn the details concerning Cisco Protection, Virtual Private Network (VPN) and Aironet Wireless Support.

Other Firewall and Virtual Private Network Technologies
As well as supporting a broad array of security solutions from Microsoft and Cisco, Progent offers organizations of all sizes top-level engineering services for solutions from other major firewall and VPN vendors. Progent's engineers can provide:

Stealth Intrusion Testing Consulting
Stealth intrusion testing is a vital method for allowing organizations to find out how vulnerable their networks are to serious attacks by showing how thoroughly network protection procedures and technologies stand up against authorized but unpublicized intrusion attempts instigated by veteran security specialists using the latest hacking techniques. Find out additional information about Progent's Penetration Testing Services.

CISM Security Support Services
Certified Information Security Manager (CISM) Engineers for Augusta-Richmond County, GeorgiaCISM defines the fundamental competencies and international benchmarks of performance that computer security professionals are required to master. CISM offers business management the assurance that those who have earned their accreditation possess the experience and knowledge to provide efficient security administration and engineering support. Progent can provide a CISM-certified expert to help your enterprise in key security disciplines including data security governance, risk management, data protection program management, and crisis handling management.

Learn additional details about Progent's CISM Security Support Assistance.

Certified Information Systems Security Professionals (CISSP) Security Consulting Expertise
CISSP Certified System Security Experts for Augusta-Richmond County, GeorgiaProgent's CISSP consultants are security engineers who have been awarded CISSP status through demonstrated experience, rigorous study, and formal testing. CISSP Certification recognizes expertise in an international standard for information security. ANSI has given the CISSP credential official recognition in the area of IT security under ISO/IEC 17024. Areas of expertise included within CISSP include security management practices, security architecture and test systems, access control methodology, software development security, business processes security, physical security, cryptography, telecommunications, network security, and disaster recovery planning.

Get the details concerning Progent's CISSP Support Services.

ISSAP-Qualified Engineers for Secure System Infrastructure
ISSAP Information Systems Security Architecture Professionals (ISSAP) for Augusta-Richmond County, GeorgiaProgent's ISSAP qualified security experts are consultants who have been awarded ISSAP certification after rigorous examination and significant hands-on work with information security architecture. ISSAP consultants have acquired in-depth knowledge of access control systems and techniques, phone system and network protection, cryptography, needs evaluation, business continuity planning (BCP) and DRP, and physical security integration. Progent's ISSAP-certified security specialists can assist your company with all aspects of architecture security.

Learn additional details about Progent's ISSAP Certified Secure System Infrastructure Engineering Support.

Certified Information Systems Auditor Support Services
Certified Information Systems Auditor (CISA) Consultants for Augusta-Richmond County, GeorgiaThe Certified Information Systems Auditor (CISA) credential is an important achievement that indicates expertise in IS security auditing. Accredited by the American National Standards Institute (ANSI), the CISA accreditation requires that consultants pass an exhaustive test overseen by the ISACA international professional association. Progent can provide the services of a CISA-certified security consultant able to help businesses in the fields of IS audit process, IT administration, systems and infrastructure planned useful life, IT support, protecting information resources, and disaster recovery planning.

Read more details concerning Progent's Certified Information Systems Auditor Consulting Expertise.

CRISC-certified IT Risk Mitigation Consultants
CRISC-certified Risk Engineers for Augusta-Richmond County, GeorgiaThe Certified in Risk and Information Systems Control (CRISC) program was established by ISACA in 2010 to verify a consultant's ability to design, implement, and maintain information system control mechanisms to mitigate network risk. Progent offers the services of a CRISC-certified engineer to assist your company to develop and carry out a workplace continuity or disaster recovery strategy based on leading practices promoted by CRISC and geared to match your company's risk appetite, business goals, and IT budget. Progent's network risk mitigation expertise is complementary to the services available from Progent's CISA-certified security engineers for objectively evaluating your IS management design and also with the services of Progent's CISM support professionals for implementing company-wide security policies and procedures.

Read additional information concerning Progent's CRISC Network Risk Mitigation Expertise.

GIAC (Global Information Assurance Certification) Professional Expertise
Security Engineers with GIAC (Global Information Assurance Certification) for Augusta-Richmond County, GeorgiaGIAC was established in 1999 to certify the skill of IT security engineers. GIAC's mission is to make sure that a certified security consultant has the knowledge appropriate to provide services in key categories of network, information, and software security. GIAC certifications are acknowledged by businesses and institutions around the world including and the U.S. National Security Agency (NSA). Progent offers the support of GIAC certified consultants for all of the network security disciplines addressed under GIAC accreditation topics such as assessing perimeters, incident response, intrusion detection, web-based application security, and SIEM solutions.

Learn additional details about Progent's GIAC Information Assurance Services.

Get in Touch with Progent for Network Security Help
If your company is located in Augusta-Richmond County or anywhere in Georgia and you're looking for security help, telephone Progent at 800-993-9400 or go to Contact Progent.














© 2002- 2018 Progent Corporation. All rights reserved.