Business information networks in Georgia can depend on quick and economical online help from Progent's certified security consultants to assist with urgent security issues. The cost is affordable, charges are by the minute, sign-up is immediate, and service is unbeatable. Progent also provides help for complex projects that demand the expertise of seasoned security engineers with top security credentials.

In case your Georgia organization is located far from larger urban areas such as Atlanta, Augusta, Columbus, Savannah, or Athens, help from local accredited network security consultants is often problematic during a security disaster. This can result in a loss of revenue for your company, angry customers, idle workers, and distracted management. By calling Progent's remote support, you can get in touch with a qualified security engineer who can offer help whenever you have to have it to get your computer network on line and recover your information.

Progent can help you in a variety of ways in your initiatives to defend your network with support that ranges from network security audits to creating a comprehensive security plan. Progent offers affordable service to assist businesses of all sizes to design and manage protected networks based on Microsoft Windows and Cisco technology and that can include computers running UNIX, Linux, Solaris, or Apple Mac OS X operating systems plus mobile users with Apple iPhones and iPads or Android or Windows Phone handsets.

Progent can also help you outsource spam blocking and protection from email-borne attacks. Email Guard is Progent's email filtering and encryption solution that incorporates the technology of top information security vendors to provide web-based control and comprehensive security for all your email traffic. The powerful structure of Email Guard managed service integrates cloud-based filtering with an on-premises security gateway device to provide complete protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based malware. The cloud filter serves as a preliminary barricade and blocks most threats from making it to your network firewall. This reduces your vulnerability to inbound attacks and saves system bandwidth and storage. Email Guard's on-premises gateway device adds a further level of inspection for incoming email. For outbound email, the local security gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and encryption. The on-premises gateway can also assist Exchange Server to track and safeguard internal email traffic that originates and ends inside your corporate firewall.

Progent's certified experts are accessible remotely or on site to offer a variety of urgent or longer-term computer security services which include:

  • Perform thorough security audits
  • Recuperate rapidly after attacks
  • Set up firewalls from multiple vendors
  • Configure safe solutions for remote and mobile access
  • Install effective solutions for protection against spam and DHAs
  • Help create a company-wide security strategy with round-the-clock security monitoring
  • Provide comprehensive Call Center Services
  • Help Develop a practical network backup and business continuity plan centered on Data Protection Manager (DPM) technology
If your network has an urgent need for computer security support, go to Progent's Emergency Remote Network Support.

Progent's support professionals can deliver world-class support in key fields of system protection including security evaluation, firewall and VPN solutions, and high-level security consulting.

System Security Evaluation
Progent's expert security consultants can assess the strength of your existing computer protection environment by performing comprehensive remote automated analysis via sophisticated software tools and tested techniques. Progent's skill in administering this testing saves your company time and money and offers a detailed picture of security holes. The information your company gains can make up the foundation of a security plan that will allow your network to operate safely and respond rapidly to new risks.

Automated Vulnerability Assessment
Progent offers expertise in the use of security analysis packages such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard NSS for affordably performing a variety of automatic network auditing checks to uncover possible security problems. Progent has extensive experience with other security analysis tools such as NMAP Port Scanner, AMAP Application Scanner, eEye Vulnerability Scanner, plus tools such as SolarWinds, Netcat, and Nikto. Progent can show you how to understand audit reports and react effectively.

Progent can help you build security into your company processes, configure auditing software, define and deploy a protected network environment, and suggest procedures to optimize the safety of your network. Progent's security engineers are available to help you set up a firewall, implement secure remote access to email and business applications, and integrate virtual private network. Find out more concerning Progent's network security assessment.

Security Inventory and Evaluation Bundles for Small Businesses
Progent offers two low-cost security inventory and evaluation bundles intended to enable small businesses to receive an impartial network security evaluation from a certified security consultant. With Progent's External Network Security Inventory Checkup, a security engineer administers a comprehensive test of your IT infrastructure from outside your firewalled perimeter to uncover possible risks in the security profile you expose to the outside world. With Progent's Internal Security Inventory Scan, an engineer executes a network scan from a secure machine inside your company firewall to uncover vulnerabilities to inside assaults. Both security inventory packages are configured and run from a secured remote location. The process is managed by a consultant with high-level security accreditations and who produces a report that summarizes and analyzes the data collected by the scan and suggests practical remediation where appropriate.

Stealth Intrusion Analysis Consulting
Stealth intrusion checking is an important component of any comprehensive network security strategy. Progentís security professionals can perform extensive penetration tests without the knowledge of your organization's internal network support resources. Stealth penetration testing uncovers whether existing security monitoring systems such as intrusion detection warnings and event log monitoring are properly configured and actively checked. Learn additional information concerning Progent's stealth penetration testing consulting.

Firewalls and VPN Support
Progent's expertise in network security solutions encompasses in-depth field work with leading firewalls and Virtual Private Network (VPN) products from a variety of vendors including Cisco, Microsoft, and Juniper. Progent can provide the services of consultants who have earned important networking certifications such as CCIE and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Integration and Troubleshooting
The new Cisco ASA 5500-X Series of firewalls with Firepower Services provide substantially more performance than Cisco's previous firewalls and have replaced the ASA 5500 and PIX security appliances for new deployments. Since Cisco's purchase of Sourcefire, the whole line of ASA 5500-X firewalls can be configured to support Firepower Services, based on Sourcefire's Snort product, which is the world's most popular network intrusion protection system. Firepower services provide enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can help your company to manage your legacy PIX or Cisco ASA 5500 security appliances and migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist you to plan, configure, optimize, administer and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Read additional information about Cisco ASA 5500-X Firewalls with Firepower configuration and debugging services.

Cisco Security and VPN Consulting Expertise
Cisco's network security and offsite connection products offer a comprehensive range of manageable security products to help protect your local and remote information system. Cisco's VPN line features switches, firewalls, intrusion detection systems and VPN concentrators. Progent's expert consulting staff includes field-proven specialists with Cisco's CCIE and CCNP qualifications who are able to assist your company to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that fit best with your business objectives. Find out additional details about Progent's Engineering Expertise for Cisco Security Solutions and VPN Products.

Consulting Expertise for Additional Firewall and Virtual Private Network Products
Progent offers small and medium size companies expert consulting for Intrusion Protection Systems and IPsec VPN products from leading firewall and Virtual Private Network security vendors such as WatchGuard, Juniper Networks, and Symantec. Progent can show you how to create a detailed security plan and choose appropriate technologies from multiple suppliers to achieve your security objectives while staying within your budget restraints.

Certified Security Planning
Every business should develop a thoroughly considered security strategy that includes both proactive processes and response planning. The pre-attack strategy is a set of procedures designed to reduce vulnerabilities. The post-attack plan assists your company's IT security engineers to assess the damage caused by an attack, fix the system, document the event, and get the IT network operational as rapidly as feasible.

Progent's certified IS security engineers are available to help your business to run a comprehensive vulnerability assessment and define a company-wide security strategy to establish security policies and controls to minimize future assaults and dangers.

CISM Accredited Information Security Support Assistance
The CISM committee defines the core capabilities and global standards of performance that information security professionals are expected to learn. It provides business management the assurance that those who have qualified for their CISM credential have the background and capability to provide efficient security management and support services. Progent offers the support of CISM certified security consultants to assist companies with:

  • IS Security Strategies
  • Risk Management
  • Network Security Program Management
  • Network Security Administration
  • Response Management
Read more details concerning Progent's CISM Qualified Network Security Engineering Services.

CISSP Certified Security Consulting Services
CISSP denotes expertise with an international standard for network security. ANSI (American National Standards Institute) has granted certification accreditation in the area of information protection defined by ISO/IEC 17024. Progent can provide access to of security consultants who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified expert to help your enterprise in a broad range of security fields including:

  • Security Management Procedures
  • Security Infrastructure and Paradigms
  • Access Control Solutions and Processes
  • Applications Development Security
  • Secure Operations
  • Physical Security
  • Encryption/Decryption Mechanisms
  • Telecom, Network and WAN Security
  • Business Continuity Planning
Find out more details concerning Progent's CISSP Accredited IS Security Engineering Professionals.

ISSAP Certified Secure Information System Architecture Engineering Support
Progent's ISSAP certified network architecture engineers are consultants who have been awarded ISSAP Certification as a result of thorough testing and significant work with information security architecture. The Information System Security Architecture Professional (ISSAP) credential represents demonstrated competence in the most in-depth demands of IS security architecture bounded by the wider scope of IS security expertise required for CISSP certification. Progent's ISSAP-certified security consultants can help your business with all aspects of architecture security including.

  • Access Control Mechanisms and Methodologies
  • Telecommunications and Network Infrastructure Security
  • Data Encryption Options
  • Needs Evaluation and Security Guidelines
  • Business Continuity Planning and DRP
  • Physical Security
Find out additional details about Progent's ISSAP Certified Secure Information System Architecture Support Expertise.

CISA Qualified Security Auditing Consulting Expertise
The Certified Information Systems Auditor (CISA) credential is a globally recognized achievement that represents mastery in network security auditing. Certified by the American National Standards Institute, the CISA credential requires that candidates pass a comprehensive test given by the ISACA professional association. Progent's CISA-qualified information security audit consultants are available to help your business in the areas of:

  • Information Systems Audit Services
  • IT Governance
  • Systems and Architecture Planned Useful Life
  • Information Technology Support
  • Safeguarding Information Resources
  • Business Continuity Preparedness
Learn more details about Progent's CISA Accredited Security Auditing Engineering Support.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA to validate a consultant's skills to plan, deploy, and support IS controls to mitigate network risk. Progent offers the services of a CRISC-certified consultant to assist you to develop and carry out a business continuity strategy based on leading practices promoted by CRISC and crafted to match your company's risk tolerance, business goals, and IT budget. Progent's CRISC network risk mitigation specialists offer a variety of risk identification services such as:

  • Gather data and study documentation to evaluate major vulnerabilities
  • Inventory legal, industry, and business requirements and company standards related to your network to assess their potential influence on your strategic goals
  • Identify potential vulnerabilities for your business workflows to assist in evaluating your corporate risk
  • Develop a risk awareness initiative and provide training to ensure your stakeholders understand information system risk so they can contribute to your risk management program
  • Connect key risk scenarios to related operational processes to help assign risk responsibility
  • Validate risk appetite with your senior management and key stakeholders to ensure they align
Learn more details concerning Progent's CRISC Consultants.

GIAC Qualified Information System Security Consulting Expertise
Global Information Assurance Certification was founded in 1999 to certify the knowledge of computer security engineers. GIAC's goal is to verify that an accredited security consultant has the skills needed to deliver support in important areas of network, information, and application program security. GIAC accreditations are acknowledged by businesses and institutions around the world including and the U.S. National Security Agency (NSA). Progent's GIAC network security audit experts can help your business with:

Read more information about Progent's GIAC Information Assurance Expertise.

Contact a Certified Progent Security Engineer
To see how to get in touch with a certified Progent security consultant for online or on-premises assistance in Georgia, call 1-800-993-9400 or visit Online Computer Help.

© 2002- 2017 Progent Corporation. All rights reserved.