Company networks in the state of Georgia can now get prompt and affordable remote technical support from Progent's certified network security support specialists to assist with critical security issues. The cost is affordable, charges are per minute, sign-up is immediate, and service is unbeatable. Progent also provides help for complex engagements that requires the expertise of senior security consultants with high-level industry credentials.

In case your Georgia small business is situated far from larger metropolitan areas like Atlanta, Augusta, Columbus, Savannah, or Athens, contact with local certified network security professionals may be limited during an emergency. This can result in lost revenue for your company, angry customers, idle employees, and distracted management. By calling Progent's remote support, you have access to a certified security consultant ready to deliver expertise whenever you need it to keep your network operating and salvage your data.

Progent can help you at any level in your initiatives to protect your network with support ranging from security assessments to developing a company-wide security strategy. Progent provides economical support to assist companies of any size to set up and maintain safe IT environments based on Windows and Cisco technology and that can include computers running UNIX, Linux, Solaris, or Apple Mac OS X platforms plus mobile users with Apple handhelds or Google Android or Windows Phone devices.

Progent can also show you how to outsource spam blocking and defense against email-borne security threats. Email Guard is Progent's email filtering and encryption solution that incorporates the services and infrastructure of leading data security companies to provide web-based control and world-class protection for your inbound and outbound email. The hybrid architecture of Progent's Email Guard integrates cloud-based filtering with an on-premises security gateway appliance to offer complete defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne malware. The cloud filter acts as a preliminary barricade and keeps the vast majority of threats from reaching your security perimeter. This decreases your exposure to external attacks and conserves network bandwidth and storage. ProSight Email Guard's on-premises security gateway appliance provides a further layer of analysis for incoming email. For outbound email, the onsite gateway provides AV and anti-spam filtering, protection against data leaks, and encryption. The onsite gateway can also help Microsoft Exchange Server to monitor and protect internal email traffic that stays inside your security perimeter.

Progent's security engineers are accessible online or on premises to offer a variety of emergency or project-based network security services including:

If your business has an immediate need for IT security support, refer to Progent's Emergency Remote Network Support.

Progent's engineers provide world-class services in key fields of computer security including analysis, firewalls and VPN, and advanced security planning.

System Assessment
Progent's certified security consultants can evaluate the strength of your current network protection environment through exhaustive remote automated analysis based on advanced software tools and tested procedures. Progent's skill in administering this testing saves you consulting fees and offers a detailed portrayal of security holes. The knowledge your company is provided can form the basis of a network protection strategy that can permit your information system to operate safely and respond rapidly to future threats.

Automated Vulnerability Analysis
Progent offers expertise in the application of security testing products including Microsoft Baseline Security Analyzer (MBSA) and LANguard from GFI for economically performing a variety of automatic system testing checks to identify possible security holes. Progent has extensive experience with other security analysis products such as NMAP Port Scanner, AMAP Application Scanner, eEye Vulnerability Scanner, plus utilities such as Metasploit, Hydra, and Nikto. Progent can show you how to understand audit reports and respond appropriately.

Progent can show you how to build security into your business processes, configure scanning tools, plan and deploy a secure system environment, and recommend policies to optimize the safety of your IT system. Progent's security consultants are able to show you how to set up a firewall, implement safe remote connectivity to email and business applications, and install VPN. Learn more concerning Progent's automated security audits.

Security Inventory Bundles for Small Companies
Progent has put together two ultra-affordable security inventory service packages intended to allow small companies to get an independent network security evaluation from an accredited security specialist. With Progent's External Network Security Inventory Checkup, a security engineer runs an extensive examination of your network from outside your company firewall to uncover possible risks in the security profile you present to the outside world. With Progent's Internal Network Security Inventory Scan, an engineer runs a system scan from a secure machine inside your firewall to evaluate vulnerabilities to inside threats. Both security inventory packages are set up and run from a protected external site. The project is overseen by a consultant with high-level security accreditations and who generates a report that summarizes and interprets the data captured by the security scan and suggests practical improvements where called for.

Network Intrusion Testing Support Services
Stealth intrusion checking is an important part of any successful network security plan. Progent’s security experts can perform extensive penetration tests without the knowledge of your organization's in-house IT resources. Unannounced penetration checking shows whether existing security monitoring systems such as intrusion incident alerts and event history monitoring are correctly configured and actively monitored. Learn more concerning Progent's network penetration testing consulting.

Firewall and Virtual Private Network Solutions
Progent's expertise in security technology encompasses extensive field work with major firewalls and Virtual Private Network products from multiple vendors such as Cisco, Microsoft, and Symantec. Progent offers the services of engineers with important networking accreditations such as CCIE and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Integration and Debugging
The current ASA 5500-X Family Next-Generation Firewalls with Firepower Services deliver significantly more value than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX firewalls for all new installations. Since Cisco's purchase of Sourcefire, the entire line of ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort product, which is the market's most popular intrusion protection system. Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can help your company to maintain your current PIX or Cisco ASA 5500 firewalls or migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can help your business to design, integrate, tune, manage and troubleshoot firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Learn more information about ASA 5500-X Firewalls with Firepower Services integration and debugging services.

Cisco Network Security and Virtual Private Network Consulting Services
Cisco's network security and offsite access products offer a complete line of easy-to-administer security products to help protect your local and remote network infrastructure. Cisco's Virtual Private Network line includes routers, firewalls, intrusion detection devices and VPN appliances. Progent's expert staff of consultants includes field-proven engineers with Cisco Certified Internetwork Expert and Cisco Certified Network Professional certifications who can help your company to select Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that align best with your business objectives. Read more details concerning Progent's Engineering Expertise for Cisco Security and VPN Products.

Support Expertise for Additional Firewall and Virtual Private Network Products
Progent provides small and mid-size companies professional support for Intrusion Protection products and IPsec VPN technology from major firewall and Virtual Private Network security vendors including WatchGuard, Juniper Networks, and Symantec. Progent can show you how to design a comprehensive security strategy and choose appropriate products from a variety of suppliers to achieve your security goals while staying within your budget restraints.

Progent's Fixed-price Managed Services for Information Assurance
Progent's affordable ProSight line of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that incorporates cutting edge behavior machine learning technology to guard endpoints and physical and virtual servers against new malware attacks such as ransomware and email phishing, which routinely get by traditional signature-matching AV products. ProSight ASM safeguards local and cloud resources and offers a single platform to address the complete threat lifecycle including protection, infiltration detection, containment, cleanup, and post-attack forensics. Key capabilities include single-click rollback with Windows VSS and automatic system-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) services offer economical in-depth security for physical and virtual servers, desktops, smartphones, and Microsoft Exchange. ProSight ESP uses contextual security and advanced heuristics for continuously monitoring and reacting to security threats from all attack vectors. ProSight ESP offers two-way firewall protection, penetration alerts, endpoint management, and web filtering through cutting-edge technologies packaged within one agent managed from a single console. Progent's security and virtualization experts can assist your business to design and configure a ProSight ESP deployment that addresses your company's unique requirements and that helps you prove compliance with government and industry information protection regulations. Progent will assist you define and configure security policies that ProSight ESP will manage, and Progent will monitor your network and respond to alerts that require immediate attention. Progent's consultants can also help your company to set up and verify a backup and disaster recovery solution such as ProSight Data Protection Services (DPS) so you can recover rapidly from a potentially disastrous cyber attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Exchange email filtering.

ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services from Progent offer small and mid-sized businesses an affordable end-to-end solution for reliable backup/disaster recovery. For a low monthly cost, ProSight Data Protection Services automates and monitors your backup processes and enables fast restoration of vital files, apps and virtual machines that have become lost or damaged as a result of component failures, software bugs, disasters, human error, or malware attacks like ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware images. Important data can be backed up on the cloud, to an on-promises storage device, or to both. Progent's backup and recovery consultants can deliver world-class expertise to set up ProSight DPS to be compliant with regulatory standards like HIPPA, FINRA, PCI and Safe Harbor and, when necessary, can help you to recover your critical data. Find out more about ProSight DPS Managed Backup.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that incorporates the infrastructure of top data security companies to provide centralized control and world-class protection for your inbound and outbound email. The hybrid structure of Progent's Email Guard integrates a Cloud Protection Layer with a local security gateway device to offer advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. Email Guard's cloud filter serves as a first line of defense and blocks most threats from making it to your security perimeter. This reduces your exposure to inbound attacks and saves network bandwidth and storage. Email Guard's on-premises gateway appliance provides a deeper layer of analysis for inbound email. For outgoing email, the onsite gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also help Microsoft Exchange Server to track and safeguard internal email traffic that stays within your security perimeter. For more information, visit Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small organization can have its key servers and apps hosted in a secure fault tolerant data center on a fast virtual host configured and managed by Progent's network support experts. Under the ProSight Virtual Hosting service model, the client owns the data, the OS software, and the apps. Since the system is virtualized, it can be ported easily to an alternate hardware environment without a time-consuming and difficult configuration process. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Find out more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, maintain, find and safeguard data related to your network infrastructure, processes, applications, and services. You can quickly find passwords or IP addresses and be warned about upcoming expirations of SSLs ,domains or warranties. By cleaning up and organizing your network documentation, you can save as much as 50% of time thrown away looking for critical information about your network. ProSight IT Asset Management includes a centralized location for holding and collaborating on all documents required for managing your network infrastructure like standard operating procedures and How-To's. ProSight IT Asset Management also offers a high level of automation for collecting and associating IT information. Whether you’re making improvements, performing maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the knowledge you need when you need it. Learn more details about Progent's ProSight IT Asset Management service.

Expert Network Security Design
Any company ought to have a thoroughly thought out security program that incorporates both proactive procedures and reaction planning. The proactive strategy is a set of procedures intended to minimize security weaknesses. The post-attack strategy helps your company's security personnel to evaluate the damage caused by an attack, fix the network, record the experience, and get the IT network running as soon as possible.

Progent's expert IT security engineers are available to help you to run a full risk assessment and define a network security strategy to establish security policies and mechanisms to reduce ongoing attacks and dangers.

CISM Qualified System Security Engineering Expertise
The Certified Information Security Manager (CISM) organization describes the basic capabilities and international standards of performance that information security managers are required to master. CISM gives business management the assurance that those who have qualified for their CISM certification possess the background and knowledge to deliver effective security administration and support services. Progent can provide the support of CISM qualified security consultants to assist businesses with:

  • Network Security Strategies
  • Vulnerability Management
  • Network Security Implementation Management
  • Network Security Management
  • Response Management
Learn additional details about Progent's CISM Security Consulting Expertise.

CISSP Accredited Security Consulting Services
CISSP recognizes mastery of a global standard for network security. ANSI (American National Standards Institute) has awarded the CISSP credential recognition in the field of data security under ISO/IEC 17024. Progent can provide the services of security professionals who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified expert to help your business in a broad range of security areas including:

  • Security Management Procedures
  • Security Architecture and Models
  • Access Control Solutions and Methodology
  • Software Development Security
  • Secure Operations
  • Site Security
  • Cryptography Mechanisms
  • Telecommunications, Network and WAN Security
  • Disaster Recovery Preparedness
Read additional information concerning Progent's CISSP-certified Information Security Support Professionals.

ISSAP Accredited Secure Information System Architecture Engineering Assistance
Progent's ISSAP qualified system architecture engineers are consultants who have been awarded ISSAP Certification through rigorous testing and extensive work with information security design. The Information System Security Architecture Professional (ISSAP) certification indicates proven competence in the more in-depth demands of information security architecture within the broader field of IS security knowledge needed for CISSP certification. Progent's ISSAP-certified security experts can help your company with all aspects of architecture security such as.

  • Access Control Mechanisms and Methodologies
  • Telecommunications and Network Infrastructure Protection
  • Data Encryption Options
  • Requirements Evaluation and Security Guidelines
  • Business Continuity Planning (BCP) and Disaster Recovery Planning
  • Physical Security
Learn additional details concerning Progent's ISSAP Certified Secure Information System Architecture Support Services.

CISA Accredited Security Auditing Consulting Services
The Certified Information Systems Auditor (CISA) credential is a recognized qualification that indicates expertise in information system security audit and control. Certified by ANSI, the CISA credential requires that candidates undergo a comprehensive test given by the ISACA international professional group. Progent's CISA-qualified security audit consultants are available to assist your company with:

  • IS Audit Process
  • IT Enforcement
  • Network Assets and Architecture Lifecycle Planning
  • Information Technology Support
  • Protecting Information Resources
  • Business Continuity Planning
Learn additional details concerning Progent's CISA Certified Security Auditing Consulting Support.

Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA in 2010 to validate an IT professional's skills to plan, implement, and maintain IS controls to reduce risk. Progent can provide the services of a CRISC-certified engineer to help you to create and execute a business continuity or disaster recovery plan that follows leading practices promoted by CRISC and geared to match your company's risk tolerance, business goals, and IT budget. Progent's CRISC-certified IT risk management consultants offer a range of risk evaluation services including:

  • Collect data and review documentation to identify significant risk scenarios
  • Identify statutory, industry, and business requirements and company policies related to your information system to determine their potential influence on your business objectives
  • Point out possible threats for your business processes to help in evaluating your enterprise risk
  • Develop a risk awareness initiative and provide seminars to ensure your stakeholders appreciate information system risk so they can contribute to your risk control program
  • Match key risk scenarios to your associated business procedures to help determine risk ownership
  • Determine risk appetite with executive leadership and key stakeholders to ensure they match
Read additional details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Certified Network Security Engineering Support
GIAC (Global Information Assurance Certification) was established in 1999 to certify the knowledge of information technology security professionals. GIAC's mission is to ensure that an accredited professional possesses the knowledge appropriate to provide support in vital areas of network, information, and software security. GIAC accreditations are recognized by companies and institutions throughout the world including and the U.S. National Security Agency. Progent's GIAC-qualified information security audit consultants can help your business in the areas of:

Find out additional information concerning Progent's GIAC Information Assurance Services.

Get in Touch with a Security Engineer
To see how you can access a Progent security consultant for remote or on-premises assistance in Georgia, call 1-800-993-9400 or visit Online Network Support.

© 2002- 2018 Progent Corporation. All rights reserved.