Company networks in Georgia can depend on prompt and economical online access to Progent's qualified network security experts to assist with urgent security issues. The cost is affordable, charges are per minute, engagement is quick, and service is unbeatable. Progent also provides help for complex projects that demand the services of senior security consultants with high-level industry credentials.

If your Georgia organization is situated away from more populated urban neighborhoods such as Atlanta, Augusta, Columbus, Savannah, or Athens, support from nearby accredited network security engineers may be problematic during an emergency. This can result in a loss of productivity for your business, upset customers, idle workers, and distracted management. By calling Progent, you have access to a qualified security professional who can deliver help whenever you need it to keep your network on line and salvage your information.

Progent can assist you in a variety of ways in your efforts to guard your IT environment with support services ranging from network security assessments to developing a company-wide security plan. Progent offers economical support to assist small and midsize companies to design and manage protected networks based on Windows and Cisco technology and that can include computers based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus mobile users with Apple iOS handhelds or Android or Windows Phone handsets.

Progent can also help you outsource spam filtering and protection from e-mail-based attacks. Email Guard is Progent's email security solution that uses the services and infrastructure of leading data security vendors to provide centralized management and world-class security for your inbound and outbound email. The powerful structure of Email Guard combines cloud-based filtering with a local security gateway device to offer advanced defense against spam, viruses, Dos Attacks, DHAs, and other email-borne threats. The cloud filter serves as a preliminary barricade and blocks the vast majority of unwanted email from making it to your network firewall. This reduces your exposure to external attacks and saves network bandwidth and storage space. ProSight Email Guard's onsite gateway device provides a deeper layer of inspection for incoming email. For outgoing email, the local gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and encryption. The on-premises gateway can also help Exchange Server to monitor and safeguard internal email that stays within your corporate firewall.

Progent's certified consultants are available online or on premises to provide a range of emergency or longer-term IT security services which include:

  • Perform comprehensive network security evaluations
  • Clean up promptly after serious security breaches
  • Set up effective firewalls
  • Configure secure solutions for remote and mobile access
  • Install advanced solutions for automatic protection against viruses, spam and DHAs
  • Develop a comprehensive security plan with proactive monitoring
  • Offer comprehensive Help Desk Call Center Support
  • Help Create a practical network backup and restore solution based on Data Protection Manager backup technology
If your business has an immediate requirement for computer security support, go to Progent's Emergency Remote Network Help.

Progent's security experts can deliver world-class support in vital areas of system security including auditing, firewall/VPN support, and high-level security consulting.

System Security Assessment
Progent's certified security engineers can assess the vulnerability of your existing network security environment by performing exhaustive remote automated testing based on sophisticated software tools and proven procedures. Progent's experience in administering this service saves you consulting fees and offers a detailed picture of gaps. The information your company gains can make up the basis of a security plan that will permit your network to operate safely and adapt rapidly to new threats.

Automated Vulnerability Audits
Progent offers consulting in the use of security testing utilities such as MBSA and GFI LANguard Network Security Scanner for affordably running a set of programmed network testing checks to identify potential security holes. Progent has broad knowledge of other security auditing tools such as NMAP, AMAP application mapper, eEye, as well as tools like SolarWinds, Netcat, and Nikto. Progent can help you to understand audit reports and respond effectively.

Progent can help you build security into your business processes, install scanning software, plan and implement a protected system architecture, and suggest policies to optimize the safety of your network. Progent's security professionals are able to show you how to configure a firewall, implement safe remote connectivity to email and data, and install VPN. Learn additional information on Progent's network security evaluation.

Security Inventory Packages for Small Businesses
Progent offers two ultra-affordable security inventory scanning bundles designed to allow small companies to receive an objective security assessment from a certified security consultant. With Progent's External Security Inventory Checkup, a security expert runs a comprehensive examination of your network from beyond your firewall to determine possible weaknesses in the security posture you expose to the outside world. With Progent's Internal Network Security Inventory Checkup, a certified security professional runs a network scan from a secure machine within your company firewall to assess your exposure to inside threats. The two security inventory packages are configured and run from a protected remote location. The project is overseen by an engineer who has earned top security credentials and who generates a document that details and interprets the data collected by the scan and suggests practical improvements if called for.

Network Penetration Testing Support Services
Stealth intrusion checking is an important part of any comprehensive network security plan. Progent’s security experts can perform thorough intrusion tests without the knowledge of your organization's in-house IT resources. Stealth penetration checking uncovers whether existing security defense systems such as intrusion detection warnings and event log monitoring are properly set up and consistently monitored. Learn additional information concerning Progent's network security penetration analysis support services.

Firewalls and VPN Solutions
Progent's background in security solutions includes extensive familiarity with leading firewalls and Virtual Private Network products from a variety of vendors such as Cisco, Microsoft, and Juniper. Progent offers the support of consultants who have earned key industry certifications including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Troubleshooting
The current Cisco ASA 5500-X Series of firewalls with Firepower Services offer significantly more performance than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new installations. Following Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the market's most deployed network intrusion protection system. Firepower services bring enhanced capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can help your company to manage your existing PIX or Cisco ASA 5500 security appliances or upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your business to design, deploy, tune, manage and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Learn more details about Cisco ASA 5500-X Firewalls with Firepower configuration and troubleshooting services.

Cisco Security and VPN Consulting Expertise
Cisco's security and offsite connection technology provide a complete line of manageable security products to help protect your local and remote network infrastructure. Cisco's VPN product family includes switches, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's expert consulting staff includes experienced engineers with Cisco Certified Internetwork Expert and CCNP certifications who are able to help your company to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that fit most closely with your company goals. Find out more information concerning Progent's Support Services for Cisco Security Solutions and VPN Products.

Consulting Services for Other Firewall and Virtual Private Network Products
Progent offers small and medium size companies professional support for Intrusion Protection products and IPsec VPN solutions from leading firewall and VPN security companies such as WatchGuard, Juniper Networks, and SonicWALL. Progent can help you create a detailed security plan and select the right technologies from multiple suppliers to support your security objectives while sticking within your spending limits.

Progent's Flat-rate Managed Services for Information Security
Progent's affordable ProSight line of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection solution that incorporates next generation behavior machine learning tools to guard endpoints and physical and virtual servers against modern malware assaults such as ransomware and email phishing, which routinely get by legacy signature-matching anti-virus tools. ProSight Active Security Monitoring safeguards local and cloud-based resources and offers a unified platform to address the complete malware attack lifecycle including blocking, identification, mitigation, remediation, and post-attack forensics. Key capabilities include one-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
Progent's ProSight Enhanced Security Protection services offer ultra-affordable multi-layer security for physical and virtual servers, workstations, mobile devices, and Exchange email. ProSight ESP utilizes contextual security and advanced heuristics for round-the-clock monitoring and responding to cyber threats from all vectors. ProSight ESP delivers firewall protection, intrusion alerts, endpoint management, and web filtering via cutting-edge tools packaged within a single agent accessible from a single control. Progent's security and virtualization consultants can help your business to plan and configure a ProSight ESP environment that meets your organization's specific requirements and that helps you demonstrate compliance with legal and industry information security standards. Progent will assist you define and implement policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alarms that require immediate action. Progent's consultants can also assist your company to install and test a backup and restore system like ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous cyber attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Microsoft Exchange email filtering.

ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services provide small and medium-sized organizations an affordable and fully managed solution for secure backup/disaster recovery. Available at a fixed monthly rate, ProSight DPS automates your backup activities and allows fast restoration of critical data, apps and virtual machines that have become unavailable or damaged as a result of hardware breakdowns, software glitches, natural disasters, human error, or malicious attacks like ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware images. Important data can be protected on the cloud, to an on-promises device, or to both. Progent's cloud backup consultants can deliver world-class support to configure ProSight Data Protection Services to be compliant with regulatory standards like HIPPA, FINRA, PCI and Safe Harbor and, when needed, can assist you to restore your critical data. Find out more about ProSight Data Protection Services Managed Backup and Recovery.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that incorporates the technology of leading data security companies to deliver web-based control and world-class protection for all your email traffic. The hybrid architecture of Progent's Email Guard managed service combines a Cloud Protection Layer with an on-premises gateway device to provide advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based threats. The Cloud Protection Layer acts as a first line of defense and blocks the vast majority of unwanted email from reaching your network firewall. This reduces your exposure to inbound threats and conserves network bandwidth and storage. Email Guard's onsite gateway appliance adds a further layer of analysis for inbound email. For outgoing email, the onsite security gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The onsite gateway can also help Microsoft Exchange Server to track and protect internal email traffic that originates and ends inside your corporate firewall. For more information, see Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and applications hosted in a protected fault tolerant data center on a fast virtual machine host set up and managed by Progent's IT support professionals. With the ProSight Virtual Hosting service model, the client retains ownership of the data, the OS platforms, and the apps. Since the system is virtualized, it can be ported easily to a different hosting environment without a lengthy and difficult configuration procedure. With ProSight Virtual Hosting, you are not locked into one hosting service. Learn more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, maintain, retrieve and protect data about your IT infrastructure, processes, applications, and services. You can quickly find passwords or IP addresses and be alerted automatically about impending expirations of SSL certificates or warranties. By cleaning up and organizing your IT infrastructure documentation, you can save up to 50% of time thrown away looking for critical information about your network. ProSight IT Asset Management includes a common repository for holding and sharing all documents required for managing your network infrastructure like standard operating procedures and How-To's. ProSight IT Asset Management also offers a high level of automation for collecting and associating IT data. Whether you’re planning enhancements, doing regular maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the knowledge you require when you need it. Find out more details about Progent's ProSight IT Asset Management service.

Expert Network Security Planning
Every business ought to develop a carefully considered security strategy that incorporates both pre-attack procedures and reaction plans. The proactive plan is a set of steps intended to reduce vulnerabilities. The reactive strategy assists your network security engineers to evaluate the impact caused by a security penetration, fix the damage, document the experience, and get business functions running as rapidly as possible.

Progent's expert information security engineers are available to assist you to perform a full risk assessment and define a company-wide security plan to implement security processes and controls to minimize future assaults and threats.

CISM Certified Network Security Consulting Assistance
The CISM committee describes the basic capabilities and international standards of performance that IT security managers are expected to master. It provides executive management the confidence that consultants who have earned their CISM credential have the background and knowledge to provide efficient security management and consulting services. Progent can provide the expertise of CISM qualified security professionals to assist businesses with:

  • IS Security Processes
  • Vulnerability Management
  • IS Security Program Management
  • Information Security Management
  • Recovery Management
Learn more details about Progent's CISM Network Security Support Professionals.

CISSP Qualified Security Consulting Services
CISSP denotes mastery of an international standard for network security. ANSI (American National Standards Institute) has awarded certification recognition in the field of data protection under ISO 17024. Progent can provide the services of security experts who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified professional to help your company in a variety security fields such as:

  • Security Management Practices
  • Security Architecture and Models
  • Access Management Solutions and Processes
  • Software Development Security
  • Operations Security
  • Site Security
  • Encryption/Decryption Technology
  • Telecommunications, LAN and Internet Security
  • Disaster Recovery Planning
Find out additional information about Progent's CISSP Qualified Security Support Professionals.

CISSP-ISSAP Certified Secure Information System Architecture Engineering Expertise
Progent's CISSP-ISSAP certified IT architecture professionals are consultants who have earned ISSAP status as a result of thorough testing and significant work with network security design. The ISSAP certification represents demonstrated skill in the more challenging requirements of information system security architecture bounded by the broader field of information system security expertise required for CISSP certification. Progent's ISSAP-qualified security experts can help your company with all phases of secure network architecture including.

  • Access Management Systems and Methodologies
  • Phone System and System Infrastructure Security
  • Cryptography Solutions
  • Needs Evaluation and Security Standards
  • Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
  • Site Security
Find out more information concerning Progent's ISSAP Accredited Secure Information System Architecture Consulting Professionals.

CISA Accredited Information System Security Auditing Engineering Services
The Certified Information Systems Auditor accreditation is a recognized achievement that signifies expertise in network security audit and control. Accredited by ANSI, the CISA credential has candidates pass a comprehensive test administered by the ISACA professional association. Progent's CISA-qualified information security audit consultants are available to assist your IT organization with:

  • IS Audit Services
  • Information Technology Enforcement
  • Network Assets and Architecture Planned Useful Life
  • Information Technology Service Delivery
  • Protecting Data Assets
  • Disaster Recovery Preparedness
Find out additional details about Progent's CISA Certified IS Security Auditing Engineering Assistance.

CRISC Consultants
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA in 2010 to validate a consultant's ability to plan, implement, and support information system control mechanisms to mitigate network risk. Progent can provide the expertise of a CRISC-certified engineer to help you to develop and carry out a workplace continuity plan based on industry best practices identified by CRISC and crafted to match your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC network risk mitigation engineers can provide a range of risk evaluation services such as:

  • Gather information and study documentation to identify major vulnerabilities
  • Inventory statutory, industry, and business requirements and company policies associated with your network to determine their possible influence on your business objectives
  • Point out potential threats for your business processes to help in evaluating your corporate risk
  • Develop a risk awareness program and conduct training to make sure your organization understand IS risk so they can contribute to your risk management program
  • Connect identified risk vectors to related business processes to help assign risk responsibility
  • Validate risk appetite with executive leadership and major stakeholders to make sure they are in agreement
Get the details concerning Progent's CRISC Risk Management Experts.

GIAC Certified Network Security Consulting Assistance
GIAC was founded in 1999 to certify the skill of IT security experts. GIAC's mission is to assure that a certified professional has the knowledge necessary to deliver services in vital areas of system, data, and application program security. GIAC certifications are recognized by businesses and institutions around the world including and the U.S. National Security Agency (NSA). Progent's GIAC-qualified security audit consultants are available to help your IT organization in the areas of:

  • Auditing Networks
  • Incident Response
  • Intrusion Detection
  • Web-based Services Security
  • SIEM solutions
Find out additional information about Progent's GIAC Information Assurance Support.

Contact a Progent Security Specialist
To learn how to contact a certified Progent security consultant for online or on-premises assistance in Georgia, call 1-800-993-9400 or go to Remote Computer Help.

© 2002- 2019 Progent Corporation. All rights reserved.